@rockcarver/frodo-lib 0.16.2-8 → 0.17.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (434) hide show
  1. package/CHANGELOG.md +221 -1
  2. package/cjs/api/AgentApi.js +14 -61
  3. package/cjs/api/AgentApi.js.map +1 -1
  4. package/cjs/api/AgentApi.test.js.map +1 -1
  5. package/cjs/api/ApiTypes.js +0 -5
  6. package/cjs/api/ApiTypes.js.map +1 -1
  7. package/cjs/api/AuthenticateApi.js +9 -20
  8. package/cjs/api/AuthenticateApi.js.map +1 -1
  9. package/cjs/api/AuthenticateApi.test.js.map +1 -0
  10. package/cjs/api/BaseApi.js +82 -124
  11. package/cjs/api/BaseApi.js.map +1 -1
  12. package/cjs/api/CirclesOfTrustApi.js +8 -32
  13. package/cjs/api/CirclesOfTrustApi.js.map +1 -1
  14. package/cjs/api/IdmConfigApi.js +9 -34
  15. package/cjs/api/IdmConfigApi.js.map +1 -1
  16. package/cjs/api/LogApi.js +8 -31
  17. package/cjs/api/LogApi.js.map +1 -1
  18. package/cjs/api/ManagedObjectApi.js +34 -31
  19. package/cjs/api/ManagedObjectApi.js.map +1 -1
  20. package/cjs/api/NodeApi.js +10 -41
  21. package/cjs/api/NodeApi.js.map +1 -1
  22. package/cjs/api/NodeApi.test.js.map +1 -1
  23. package/cjs/api/OAuth2ClientApi.js +7 -26
  24. package/cjs/api/OAuth2ClientApi.js.map +1 -1
  25. package/cjs/api/OAuth2OIDCApi.js +28 -34
  26. package/cjs/api/OAuth2OIDCApi.js.map +1 -1
  27. package/cjs/api/OAuth2OIDCApi.test.js.map +1 -0
  28. package/cjs/api/OAuth2ProviderApi.js +5 -15
  29. package/cjs/api/OAuth2ProviderApi.js.map +1 -1
  30. package/cjs/api/RealmApi.js +8 -34
  31. package/cjs/api/RealmApi.js.map +1 -1
  32. package/cjs/api/Saml2Api.js +32 -118
  33. package/cjs/api/Saml2Api.js.map +1 -1
  34. package/cjs/api/ScriptApi.js +8 -30
  35. package/cjs/api/ScriptApi.js.map +1 -1
  36. package/cjs/api/SecretsApi.js +14 -64
  37. package/cjs/api/SecretsApi.js.map +1 -1
  38. package/cjs/api/SecretsApi.test.js.map +1 -1
  39. package/cjs/api/ServerInfoApi.js +6 -21
  40. package/cjs/api/ServerInfoApi.js.map +1 -1
  41. package/cjs/api/ServiceApi.js +49 -47
  42. package/cjs/api/ServiceApi.js.map +1 -1
  43. package/cjs/api/SocialIdentityProvidersApi.js +9 -36
  44. package/cjs/api/SocialIdentityProvidersApi.js.map +1 -1
  45. package/cjs/api/StartupApi.js +5 -24
  46. package/cjs/api/StartupApi.js.map +1 -1
  47. package/cjs/api/StartupApi.test.js.map +1 -1
  48. package/cjs/api/TreeApi.js +8 -30
  49. package/cjs/api/TreeApi.js.map +1 -1
  50. package/cjs/api/TreeApi.test.js.map +1 -1
  51. package/cjs/api/VariablesApi.js +9 -37
  52. package/cjs/api/VariablesApi.js.map +1 -1
  53. package/cjs/api/VariablesApi.test.js.map +1 -1
  54. package/cjs/api/utils/ApiUtils.js +47 -57
  55. package/cjs/api/utils/ApiUtils.js.map +1 -1
  56. package/cjs/api/utils/ApiUtils.test.js.map +1 -1
  57. package/cjs/api/utils/Base64.js +6 -15
  58. package/cjs/api/utils/Base64.js.map +1 -1
  59. package/cjs/ext/axios-curlirize/curlirize.js +2 -9
  60. package/cjs/ext/axios-curlirize/curlirize.js.map +1 -1
  61. package/cjs/ext/axios-curlirize/lib/CurlHelper.js +7 -22
  62. package/cjs/ext/axios-curlirize/lib/CurlHelper.js.map +1 -1
  63. package/cjs/index.js +30 -89
  64. package/cjs/index.js.map +1 -1
  65. package/cjs/ops/AdminOps.js +27 -165
  66. package/cjs/ops/AdminOps.js.map +1 -1
  67. package/cjs/ops/AgentOps.js +3 -160
  68. package/cjs/ops/AgentOps.js.map +1 -1
  69. package/cjs/ops/AgentOps.test.js.map +1 -1
  70. package/cjs/ops/AuthenticateOps.js +265 -226
  71. package/cjs/ops/AuthenticateOps.js.map +1 -1
  72. package/cjs/ops/AuthenticateOps.test.js.map +1 -1
  73. package/cjs/ops/CirclesOfTrustOps.js +13 -91
  74. package/cjs/ops/CirclesOfTrustOps.js.map +1 -1
  75. package/cjs/ops/ConnectionProfileOps.js +220 -136
  76. package/cjs/ops/ConnectionProfileOps.js.map +1 -1
  77. package/cjs/ops/ConnectionProfileOps.test.js.map +1 -1
  78. package/cjs/ops/EmailTemplateOps.js +35 -379
  79. package/cjs/ops/EmailTemplateOps.js.map +1 -1
  80. package/cjs/ops/EmailTemplateOps.test.js.map +1 -1
  81. package/cjs/ops/IdmOps.js +52 -426
  82. package/cjs/ops/IdmOps.js.map +1 -1
  83. package/cjs/ops/IdmOps.test.js.map +1 -1
  84. package/cjs/ops/IdpOps.js +11 -94
  85. package/cjs/ops/IdpOps.js.map +1 -1
  86. package/cjs/ops/IdpOps.test.js.map +1 -1
  87. package/cjs/ops/JoseOps.js +81 -0
  88. package/cjs/ops/JoseOps.js.map +1 -0
  89. package/cjs/ops/JoseOps.test.js.map +1 -0
  90. package/cjs/ops/JourneyOps.js +140 -371
  91. package/cjs/ops/JourneyOps.js.map +1 -1
  92. package/cjs/ops/JourneyOps.test.js.map +1 -1
  93. package/cjs/ops/LogOps.js +14 -47
  94. package/cjs/ops/LogOps.js.map +1 -1
  95. package/cjs/ops/ManagedObjectOps.js +4 -12
  96. package/cjs/ops/ManagedObjectOps.js.map +1 -1
  97. package/cjs/ops/NodeOps.js +9 -67
  98. package/cjs/ops/NodeOps.js.map +1 -1
  99. package/cjs/ops/OAuth2ClientOps.js +10 -40
  100. package/cjs/ops/OAuth2ClientOps.js.map +1 -1
  101. package/cjs/ops/OpsTypes.js +0 -5
  102. package/cjs/ops/OpsTypes.js.map +1 -1
  103. package/cjs/ops/OrganizationOps.js +6 -25
  104. package/cjs/ops/OrganizationOps.js.map +1 -1
  105. package/cjs/ops/RealmOps.js +0 -19
  106. package/cjs/ops/RealmOps.js.map +1 -1
  107. package/cjs/ops/Saml2Ops.js +258 -802
  108. package/cjs/ops/Saml2Ops.js.map +1 -1
  109. package/cjs/ops/Saml2Ops.test.js.map +1 -1
  110. package/cjs/ops/ScriptOps.js +28 -73
  111. package/cjs/ops/ScriptOps.js.map +1 -1
  112. package/cjs/ops/SecretsOps.js +2 -58
  113. package/cjs/ops/SecretsOps.js.map +1 -1
  114. package/cjs/ops/ServiceAccountOps.js +61 -0
  115. package/cjs/ops/ServiceAccountOps.js.map +1 -0
  116. package/cjs/ops/ServiceAccountOps.test.js.map +1 -0
  117. package/cjs/ops/ServiceOps.js +55 -101
  118. package/cjs/ops/ServiceOps.js.map +1 -1
  119. package/cjs/ops/StartupOps.js +2 -23
  120. package/cjs/ops/StartupOps.js.map +1 -1
  121. package/cjs/ops/ThemeOps.js +230 -436
  122. package/cjs/ops/ThemeOps.js.map +1 -1
  123. package/cjs/ops/ThemeOps.test.js.map +1 -0
  124. package/cjs/ops/VariablesOps.js +0 -38
  125. package/cjs/ops/VariablesOps.js.map +1 -1
  126. package/cjs/ops/utils/Console.js +29 -62
  127. package/cjs/ops/utils/Console.js.map +1 -1
  128. package/cjs/ops/utils/DataProtection.js +13 -47
  129. package/cjs/ops/utils/DataProtection.js.map +1 -1
  130. package/cjs/ops/utils/DataProtection.test.js.map +1 -1
  131. package/cjs/ops/utils/ExportImportUtils.js +36 -74
  132. package/cjs/ops/utils/ExportImportUtils.js.map +1 -1
  133. package/cjs/ops/utils/ExportImportUtils.test.js.map +1 -1
  134. package/cjs/ops/utils/OpsUtils.js +27 -43
  135. package/cjs/ops/utils/OpsUtils.js.map +1 -1
  136. package/cjs/ops/utils/OpsUtils.test.js.map +1 -1
  137. package/cjs/ops/utils/ValidationUtils.js +0 -13
  138. package/cjs/ops/utils/ValidationUtils.js.map +1 -1
  139. package/cjs/ops/utils/ValidationUtils.test.js.map +1 -1
  140. package/cjs/ops/utils/Version.js +2 -12
  141. package/cjs/ops/utils/Version.js.map +1 -1
  142. package/cjs/ops/utils/Version.test.js.map +1 -1
  143. package/cjs/ops/utils/Wordwrap.js +1 -2
  144. package/cjs/ops/utils/Wordwrap.js.map +1 -1
  145. package/cjs/ops/utils/Wordwrap.test.js.map +1 -0
  146. package/cjs/shared/State.js +239 -0
  147. package/cjs/shared/State.js.map +1 -0
  148. package/cjs/shared/State.test.js.map +1 -0
  149. package/cjs/storage/StaticStorage.js.map +1 -1
  150. package/cjs/test/mocks/AuthenticateApi/step/default_steps.json +88 -0
  151. package/cjs/test/mocks/ForgeRockApiMockEngine.js +184 -80
  152. package/cjs/test/mocks/ForgeRockApiMockEngine.js.map +1 -1
  153. package/cjs/test/mocks/IdmConfigApi/getConfigEntity/managed.json +4420 -0
  154. package/cjs/test/mocks/OAuth2OIDCApi/accessToken/body.json +6 -0
  155. package/cjs/test/mocks/OAuth2OIDCApi/accessToken/headers.json +19 -0
  156. package/cjs/test/mocks/OAuth2OIDCApi/authorize/headers.json +38 -0
  157. package/cjs/test/mocks/Saml2Api/findSaml2Providers/https:sts.windows.net711ffa9c-5972-4713-ace3-688c9732614a_stub.json +18 -0
  158. package/cjs/test/mocks/Saml2Api/findSaml2Providers/iSPAzure_stub.json +18 -0
  159. package/cjs/test/mocks/Saml2Api/getProvider/aVNQQXp1cmU.json +1 -2
  160. package/cjs/test/mocks/Saml2Api/getProvider/dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.json +1 -3
  161. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/U1BBenVyZQ.json +147 -0
  162. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQXp1cmU.json +182 -0
  163. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQnJvYWRjb20.json +149 -0
  164. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQRmVkbGV0.json +141 -0
  165. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aVNQQXp1cmU.json +1 -2
  166. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/dm9sa2VyRGV2U1A.json +118 -0
  167. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aHR0cHM6Ly9zYW1sLm15dGVzdHJ1bi5jb20vc3A.json +66 -0
  168. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aHR0cHM6Ly9zdHMud2luZG93cy5uZXQvNzExZmZhOWMtNTk3Mi00NzEzLWFjZTMtNjg4Yzk3MzI2MTRhLw.json +35 -0
  169. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aWRw.json +83 -0
  170. package/cjs/test/mocks/Saml2Api/getProviderByLocationAndId/remote/dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.json +1 -3
  171. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/SPAzure.xml +74 -0
  172. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPAzure.xml +78 -0
  173. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPBroadcom.xml +78 -0
  174. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPFedlet.xml +78 -0
  175. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fsaml.mytestrun.com%2Fsp.xml +13 -0
  176. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/{dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.xml → https%3A%2F%2Fsts.windows.net%2F711ffa9c-5972-4713-ace3-688c9732614a%2F.xml} +0 -0
  177. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/{aVNQQXp1cmU.xml → iSPAzure.xml} +0 -0
  178. package/cjs/test/mocks/Saml2Api/getProviderMetadata/alpha/urn%3Afederation%3AMicrosoftOnline.xml +84 -0
  179. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/SPAzure.saml.json +243 -0
  180. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/iSPAzure.saml.json +242 -0
  181. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPAzure.saml.json +454 -0
  182. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPBroadcom.saml.json +586 -0
  183. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPFedlet.saml.json +241 -0
  184. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/idp.saml.json +185 -0
  185. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/saml.mytestrun.comsp.saml.json +101 -0
  186. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/sts.windows.net711ffa9c-5972-4713-ace3-688c9732614a.saml.json +113 -0
  187. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/urn:federation:MicrosoftOnline.saml.json +199 -0
  188. package/cjs/test/mocks/Saml2Ops/importSaml2Provider/volkerDevSP.saml.json +212 -0
  189. package/cjs/test/mocks/Saml2Ops/importSaml2Providers/allAlphaProviders.saml.json +2414 -0
  190. package/cjs/test/mocks/ScriptApi/getScript/5b29c5b7-b161-4a42-a41f-d6c85316b951.json +13 -0
  191. package/cjs/test/mocks/ScriptApi/getScript/85523e71-2d77-4577-b078-6f9674cc54e2.json +13 -0
  192. package/cjs/test/mocks/ScriptApi/getScript/90c4eca5-05f0-42f5-b9bf-88b693eabbbd.json +13 -0
  193. package/cjs/test/mocks/ServerInfoApi/getServerInfo/info.json +25 -0
  194. package/cjs/test/mocks/ServerInfoApi/getServerVersionInfo/version.json +8 -0
  195. package/cjs/utils/AutoSetupPolly.js +79 -0
  196. package/cjs/utils/AutoSetupPolly.js.map +1 -0
  197. package/cjs/utils/SetupJest.js +6 -0
  198. package/cjs/utils/SetupJest.js.map +1 -0
  199. package/cjs/{test/mocks → utils}/snapshotResolve.js +10 -12
  200. package/cjs/utils/snapshotResolve.js.map +1 -0
  201. package/esm/api/AgentApi.mjs +19 -21
  202. package/esm/api/AgentApi.test.mjs +6 -15
  203. package/esm/api/ApiTypes.mjs +0 -5
  204. package/esm/api/AuthenticateApi.mjs +7 -10
  205. package/esm/api/AuthenticateApi.test.mjs +39 -0
  206. package/esm/api/BaseApi.mjs +96 -81
  207. package/esm/api/CirclesOfTrustApi.mjs +9 -12
  208. package/esm/api/IdmConfigApi.mjs +11 -12
  209. package/esm/api/LogApi.mjs +6 -10
  210. package/esm/api/ManagedObjectApi.mjs +23 -8
  211. package/esm/api/NodeApi.mjs +13 -15
  212. package/esm/api/NodeApi.test.mjs +13 -17
  213. package/esm/api/OAuth2ClientApi.mjs +7 -9
  214. package/esm/api/OAuth2OIDCApi.mjs +15 -9
  215. package/esm/api/OAuth2OIDCApi.test.mjs +53 -0
  216. package/esm/api/OAuth2ProviderApi.mjs +3 -5
  217. package/esm/api/RealmApi.mjs +10 -13
  218. package/esm/api/Saml2Api.mjs +31 -61
  219. package/esm/api/ScriptApi.mjs +9 -11
  220. package/esm/api/SecretsApi.mjs +21 -24
  221. package/esm/api/SecretsApi.test.mjs +9 -31
  222. package/esm/api/ServerInfoApi.mjs +5 -9
  223. package/esm/api/ServiceApi.mjs +53 -26
  224. package/esm/api/SocialIdentityProvidersApi.mjs +11 -13
  225. package/esm/api/StartupApi.mjs +5 -10
  226. package/esm/api/StartupApi.test.mjs +4 -7
  227. package/esm/api/TreeApi.mjs +9 -11
  228. package/esm/api/TreeApi.test.mjs +24 -61
  229. package/esm/api/VariablesApi.mjs +11 -13
  230. package/esm/api/VariablesApi.test.mjs +80 -222
  231. package/esm/api/utils/ApiUtils.mjs +45 -48
  232. package/esm/api/utils/ApiUtils.test.mjs +33 -32
  233. package/esm/api/utils/Base64.mjs +6 -9
  234. package/esm/ext/axios-curlirize/curlirize.mjs +2 -7
  235. package/esm/ext/axios-curlirize/lib/CurlHelper.mjs +7 -20
  236. package/esm/index.mjs +23 -13
  237. package/esm/ops/AdminOps.mjs +33 -119
  238. package/esm/ops/AgentOps.mjs +38 -81
  239. package/esm/ops/AgentOps.test.mjs +5 -45
  240. package/esm/ops/AuthenticateOps.mjs +241 -175
  241. package/esm/ops/AuthenticateOps.test.mjs +7 -9
  242. package/esm/ops/CirclesOfTrustOps.mjs +24 -61
  243. package/esm/ops/ConnectionProfileOps.mjs +192 -82
  244. package/esm/ops/ConnectionProfileOps.test.mjs +19 -19
  245. package/esm/ops/EmailTemplateOps.mjs +18 -276
  246. package/esm/ops/EmailTemplateOps.test.mjs +19 -44
  247. package/esm/ops/IdmOps.mjs +30 -327
  248. package/esm/ops/IdmOps.test.mjs +47 -54
  249. package/esm/ops/IdpOps.mjs +21 -59
  250. package/esm/ops/IdpOps.test.mjs +5 -5
  251. package/esm/ops/JoseOps.mjs +41 -0
  252. package/esm/ops/JoseOps.test.mjs +137 -0
  253. package/esm/ops/JourneyOps.mjs +147 -290
  254. package/esm/ops/JourneyOps.test.mjs +30 -28
  255. package/esm/ops/LogOps.mjs +15 -25
  256. package/esm/ops/ManagedObjectOps.mjs +6 -6
  257. package/esm/ops/NodeOps.mjs +9 -47
  258. package/esm/ops/OAuth2ClientOps.mjs +13 -19
  259. package/esm/ops/OpsTypes.mjs +1 -3
  260. package/esm/ops/OrganizationOps.mjs +7 -14
  261. package/esm/ops/RealmOps.mjs +4 -7
  262. package/esm/ops/Saml2Ops.mjs +199 -587
  263. package/esm/ops/Saml2Ops.test.mjs +303 -84
  264. package/esm/ops/ScriptOps.mjs +31 -47
  265. package/esm/ops/SecretsOps.mjs +15 -31
  266. package/esm/ops/ServiceAccountOps.mjs +41 -0
  267. package/esm/ops/ServiceAccountOps.test.mjs +51 -0
  268. package/esm/ops/ServiceOps.mjs +66 -83
  269. package/esm/ops/StartupOps.mjs +4 -13
  270. package/esm/ops/ThemeOps.mjs +189 -298
  271. package/esm/{api/ThemeApi.test.mjs → ops/ThemeOps.test.mjs} +91 -96
  272. package/esm/ops/VariablesOps.mjs +9 -18
  273. package/esm/ops/utils/Console.mjs +28 -46
  274. package/esm/ops/utils/DataProtection.mjs +15 -28
  275. package/esm/ops/utils/DataProtection.test.mjs +8 -8
  276. package/esm/ops/utils/ExportImportUtils.mjs +34 -43
  277. package/esm/ops/utils/ExportImportUtils.test.mjs +20 -18
  278. package/esm/ops/utils/OpsUtils.mjs +27 -21
  279. package/esm/ops/utils/OpsUtils.test.mjs +155 -27
  280. package/esm/ops/utils/ValidationUtils.mjs +0 -9
  281. package/esm/ops/utils/Version.mjs +2 -3
  282. package/esm/ops/utils/Version.test.mjs +0 -2
  283. package/esm/ops/utils/Wordwrap.mjs +1 -1
  284. package/esm/ops/utils/Wordwrap.test.mjs +19 -0
  285. package/esm/shared/State.mjs +164 -0
  286. package/esm/shared/State.test.mjs +249 -0
  287. package/esm/test/mocks/AuthenticateApi/step/default_steps.json +88 -0
  288. package/esm/test/mocks/ForgeRockApiMockEngine.mjs +169 -33
  289. package/esm/test/mocks/IdmConfigApi/getConfigEntity/managed.json +4420 -0
  290. package/esm/test/mocks/OAuth2OIDCApi/accessToken/body.json +6 -0
  291. package/esm/test/mocks/OAuth2OIDCApi/accessToken/headers.json +19 -0
  292. package/esm/test/mocks/OAuth2OIDCApi/authorize/headers.json +38 -0
  293. package/esm/test/mocks/Saml2Api/findSaml2Providers/https:sts.windows.net711ffa9c-5972-4713-ace3-688c9732614a_stub.json +18 -0
  294. package/esm/test/mocks/Saml2Api/findSaml2Providers/iSPAzure_stub.json +18 -0
  295. package/esm/test/mocks/Saml2Api/getProvider/aVNQQXp1cmU.json +1 -2
  296. package/esm/test/mocks/Saml2Api/getProvider/dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.json +1 -3
  297. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/U1BBenVyZQ.json +147 -0
  298. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQXp1cmU.json +182 -0
  299. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQnJvYWRjb20.json +149 -0
  300. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQRmVkbGV0.json +141 -0
  301. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/aVNQQXp1cmU.json +1 -2
  302. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/hosted/dm9sa2VyRGV2U1A.json +118 -0
  303. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aHR0cHM6Ly9zYW1sLm15dGVzdHJ1bi5jb20vc3A.json +66 -0
  304. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aHR0cHM6Ly9zdHMud2luZG93cy5uZXQvNzExZmZhOWMtNTk3Mi00NzEzLWFjZTMtNjg4Yzk3MzI2MTRhLw.json +35 -0
  305. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/remote/aWRw.json +83 -0
  306. package/esm/test/mocks/Saml2Api/getProviderByLocationAndId/remote/dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.json +1 -3
  307. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/SPAzure.xml +74 -0
  308. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPAzure.xml +78 -0
  309. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPBroadcom.xml +78 -0
  310. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fidc.scheuber.io%2Fam%2Fsaml2%2FIDPFedlet.xml +78 -0
  311. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/https%3A%2F%2Fsaml.mytestrun.com%2Fsp.xml +13 -0
  312. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/{dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l.xml → https%3A%2F%2Fsts.windows.net%2F711ffa9c-5972-4713-ace3-688c9732614a%2F.xml} +0 -0
  313. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/{aVNQQXp1cmU.xml → iSPAzure.xml} +0 -0
  314. package/esm/test/mocks/Saml2Api/getProviderMetadata/alpha/urn%3Afederation%3AMicrosoftOnline.xml +84 -0
  315. package/esm/test/mocks/Saml2Ops/importSaml2Provider/SPAzure.saml.json +243 -0
  316. package/esm/test/mocks/Saml2Ops/importSaml2Provider/iSPAzure.saml.json +242 -0
  317. package/esm/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPAzure.saml.json +454 -0
  318. package/esm/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPBroadcom.saml.json +586 -0
  319. package/esm/test/mocks/Saml2Ops/importSaml2Provider/idc.scheuber.ioamsaml2IDPFedlet.saml.json +241 -0
  320. package/esm/test/mocks/Saml2Ops/importSaml2Provider/idp.saml.json +185 -0
  321. package/esm/test/mocks/Saml2Ops/importSaml2Provider/saml.mytestrun.comsp.saml.json +101 -0
  322. package/esm/test/mocks/Saml2Ops/importSaml2Provider/sts.windows.net711ffa9c-5972-4713-ace3-688c9732614a.saml.json +113 -0
  323. package/esm/test/mocks/Saml2Ops/importSaml2Provider/urn:federation:MicrosoftOnline.saml.json +199 -0
  324. package/esm/test/mocks/Saml2Ops/importSaml2Provider/volkerDevSP.saml.json +212 -0
  325. package/esm/test/mocks/Saml2Ops/importSaml2Providers/allAlphaProviders.saml.json +2414 -0
  326. package/esm/test/mocks/ScriptApi/getScript/5b29c5b7-b161-4a42-a41f-d6c85316b951.json +13 -0
  327. package/esm/test/mocks/ScriptApi/getScript/85523e71-2d77-4577-b078-6f9674cc54e2.json +13 -0
  328. package/esm/test/mocks/ScriptApi/getScript/90c4eca5-05f0-42f5-b9bf-88b693eabbbd.json +13 -0
  329. package/esm/test/mocks/ServerInfoApi/getServerInfo/info.json +25 -0
  330. package/esm/test/mocks/ServerInfoApi/getServerVersionInfo/version.json +8 -0
  331. package/esm/utils/AutoSetupPolly.mjs +72 -0
  332. package/esm/utils/SetupJest.mjs +3 -0
  333. package/esm/{test/mocks → utils}/snapshotResolve.mjs +10 -12
  334. package/package.json +38 -27
  335. package/types/api/AgentApi.d.ts.map +1 -1
  336. package/types/api/ApiTypes.d.ts +19 -15
  337. package/types/api/ApiTypes.d.ts.map +1 -1
  338. package/types/api/AuthenticateApi.d.ts +1 -1
  339. package/types/api/AuthenticateApi.d.ts.map +1 -1
  340. package/types/api/BaseApi.d.ts +2 -0
  341. package/types/api/BaseApi.d.ts.map +1 -1
  342. package/types/api/CirclesOfTrustApi.d.ts.map +1 -1
  343. package/types/api/IdmConfigApi.d.ts.map +1 -1
  344. package/types/api/LogApi.d.ts.map +1 -1
  345. package/types/api/ManagedObjectApi.d.ts +9 -1
  346. package/types/api/ManagedObjectApi.d.ts.map +1 -1
  347. package/types/api/NodeApi.d.ts.map +1 -1
  348. package/types/api/OAuth2ClientApi.d.ts.map +1 -1
  349. package/types/api/OAuth2OIDCApi.d.ts +4 -2
  350. package/types/api/OAuth2OIDCApi.d.ts.map +1 -1
  351. package/types/api/OAuth2ProviderApi.d.ts.map +1 -1
  352. package/types/api/RealmApi.d.ts.map +1 -1
  353. package/types/api/Saml2Api.d.ts +7 -13
  354. package/types/api/Saml2Api.d.ts.map +1 -1
  355. package/types/api/ScriptApi.d.ts.map +1 -1
  356. package/types/api/SecretsApi.d.ts.map +1 -1
  357. package/types/api/ServerInfoApi.d.ts.map +1 -1
  358. package/types/api/ServiceApi.d.ts +14 -7
  359. package/types/api/ServiceApi.d.ts.map +1 -1
  360. package/types/api/SocialIdentityProvidersApi.d.ts.map +1 -1
  361. package/types/api/StartupApi.d.ts.map +1 -1
  362. package/types/api/TreeApi.d.ts.map +1 -1
  363. package/types/api/VariablesApi.d.ts.map +1 -1
  364. package/types/api/utils/ApiUtils.d.ts +1 -0
  365. package/types/api/utils/ApiUtils.d.ts.map +1 -1
  366. package/types/api/utils/Base64.d.ts +1 -0
  367. package/types/api/utils/Base64.d.ts.map +1 -1
  368. package/types/index.d.ts +11 -5
  369. package/types/index.d.ts.map +1 -1
  370. package/types/ops/AgentOps.d.ts +1 -1
  371. package/types/ops/AgentOps.d.ts.map +1 -1
  372. package/types/ops/AuthenticateOps.d.ts +10 -2
  373. package/types/ops/AuthenticateOps.d.ts.map +1 -1
  374. package/types/ops/ConnectionProfileOps.d.ts +49 -21
  375. package/types/ops/ConnectionProfileOps.d.ts.map +1 -1
  376. package/types/ops/EmailTemplateOps.d.ts +14 -33
  377. package/types/ops/EmailTemplateOps.d.ts.map +1 -1
  378. package/types/ops/IdmOps.d.ts +29 -37
  379. package/types/ops/IdmOps.d.ts.map +1 -1
  380. package/types/ops/JoseOps.d.ts +33 -0
  381. package/types/ops/JoseOps.d.ts.map +1 -0
  382. package/types/ops/JourneyOps.d.ts.map +1 -1
  383. package/types/ops/LogOps.d.ts.map +1 -1
  384. package/types/ops/NodeOps.d.ts.map +1 -1
  385. package/types/ops/OAuth2ClientOps.d.ts.map +1 -1
  386. package/types/ops/OpsTypes.d.ts +17 -1
  387. package/types/ops/OpsTypes.d.ts.map +1 -1
  388. package/types/ops/OrganizationOps.d.ts.map +1 -1
  389. package/types/ops/Saml2Ops.d.ts +52 -55
  390. package/types/ops/Saml2Ops.d.ts.map +1 -1
  391. package/types/ops/ScriptOps.d.ts.map +1 -1
  392. package/types/ops/ServiceAccountOps.d.ts +20 -0
  393. package/types/ops/ServiceAccountOps.d.ts.map +1 -0
  394. package/types/ops/ServiceOps.d.ts +18 -10
  395. package/types/ops/ServiceOps.d.ts.map +1 -1
  396. package/types/ops/ThemeOps.d.ts +35 -50
  397. package/types/ops/ThemeOps.d.ts.map +1 -1
  398. package/types/ops/utils/Console.d.ts +1 -1
  399. package/types/ops/utils/Console.d.ts.map +1 -1
  400. package/types/ops/utils/DataProtection.d.ts.map +1 -1
  401. package/types/ops/utils/ExportImportUtils.d.ts +5 -2
  402. package/types/ops/utils/ExportImportUtils.d.ts.map +1 -1
  403. package/types/ops/utils/OpsUtils.d.ts +6 -0
  404. package/types/ops/utils/OpsUtils.d.ts.map +1 -1
  405. package/types/ops/utils/Wordwrap.d.ts.map +1 -1
  406. package/types/shared/State.d.ts +223 -0
  407. package/types/shared/State.d.ts.map +1 -0
  408. package/types/test/mocks/ForgeRockApiMockEngine.d.ts +21 -1
  409. package/types/test/mocks/ForgeRockApiMockEngine.d.ts.map +1 -1
  410. package/types/utils/AutoSetupPolly.d.ts +1 -0
  411. package/types/utils/AutoSetupPolly.d.ts.map +1 -0
  412. package/types/utils/SetupJest.d.ts +1 -0
  413. package/types/utils/SetupJest.d.ts.map +1 -0
  414. package/types/utils/snapshotResolve.d.ts +1 -0
  415. package/types/utils/snapshotResolve.d.ts.map +1 -0
  416. package/cjs/api/EmailTemplateApi.js +0 -73
  417. package/cjs/api/EmailTemplateApi.js.map +0 -1
  418. package/cjs/api/ThemeApi.js +0 -367
  419. package/cjs/api/ThemeApi.js.map +0 -1
  420. package/cjs/api/ThemeApi.test.js.map +0 -1
  421. package/cjs/storage/SessionStorage.js +0 -91
  422. package/cjs/storage/SessionStorage.js.map +0 -1
  423. package/cjs/test/mocks/snapshotResolve.js.map +0 -1
  424. package/esm/api/EmailTemplateApi.mjs +0 -34
  425. package/esm/api/ThemeApi.mjs +0 -271
  426. package/esm/storage/SessionStorage.mjs +0 -79
  427. package/types/api/EmailTemplateApi.d.ts +0 -22
  428. package/types/api/EmailTemplateApi.d.ts.map +0 -1
  429. package/types/api/ThemeApi.d.ts +0 -56
  430. package/types/api/ThemeApi.d.ts.map +0 -1
  431. package/types/storage/SessionStorage.d.ts +0 -71
  432. package/types/storage/SessionStorage.d.ts.map +0 -1
  433. package/types/test/mocks/snapshotResolve.d.ts +0 -1
  434. package/types/test/mocks/snapshotResolve.d.ts.map +0 -1
@@ -0,0 +1,2414 @@
1
+ {
2
+ "meta": {
3
+ "origin": "https://openam-volker-dev.forgeblocks.com/am",
4
+ "originAmVersion": "7.3.0",
5
+ "exportedBy": "volker.scheuber@forgerock.com",
6
+ "exportDate": "2022-11-20T21:40:42.858Z",
7
+ "exportTool": "frodo",
8
+ "exportToolVersion": "v0.16.2-8 [v18.7.0]"
9
+ },
10
+ "script": {
11
+ "85523e71-2d77-4577-b078-6f9674cc54e2": {
12
+ "_id": "85523e71-2d77-4577-b078-6f9674cc54e2",
13
+ "name": "Saml2 IDP Adapter Always Auth",
14
+ "description": "Always redirect browser pre-auth",
15
+ "script": [
16
+ "/*",
17
+ " * Copyright 2021-2022 ForgeRock AS. All Rights Reserved",
18
+ " *",
19
+ " * Use of this code requires a commercial software license with ForgeRock AS.",
20
+ " * or with one of its affiliates. All use shall be exclusively subject",
21
+ " * to such license between the licensee and ForgeRock AS.",
22
+ " */",
23
+ "",
24
+ "/*",
25
+ " * The script has these top level functions that could be executed during a SAML2 flow.",
26
+ " * - preSingleSignOn",
27
+ " * - preAuthentication",
28
+ " * - preSendResponse",
29
+ " * - preSignResponse",
30
+ " * - preSendFailureResponse",
31
+ " *",
32
+ " * Please see the javadoc for the interface definition and more information about these methods.",
33
+ " * https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/plugins/SAML2IdentityProviderAdapter.html",
34
+ " * Note that the initialize method is not supported in the scripts.",
35
+ " *",
36
+ " * Defined variables. Check the documentation on the respective functions for the variables available to it.",
37
+ " *",
38
+ " * hostedEntityId - String",
39
+ " * Entity ID for the hosted IDP",
40
+ " * realm - String",
41
+ " * Realm of the hosted IDP",
42
+ " * idpAdapterScriptHelper - IdpAdapterScriptHelper (1)",
43
+ " * An instance of IdpAdapterScriptHelper containing helper methods. See Javadoc for more details.",
44
+ " * request - HttpServletRequest (2)",
45
+ " * Servlet request object",
46
+ " * response - HttpServletResponse (3)",
47
+ " * Servlet response object",
48
+ " * authnRequest - AuthnRequest (4)",
49
+ " * The original authentication request sent from SP",
50
+ " * reqId - String",
51
+ " * The id to use for continuation of processing if the adapter redirects",
52
+ " * res - Response (5)",
53
+ " * The SAML Response",
54
+ " * session - SSOToken (6)",
55
+ " * The single sign-on session. The reference type of this is Object and would need to be casted to SSOToken.",
56
+ " * relayState - String",
57
+ " * The relayState that will be used in the redirect",
58
+ " * faultCode - String",
59
+ " * the fault code that will be returned in the SAML response",
60
+ " * faultDetail - String",
61
+ " * the fault detail that will be returned in the SAML response",
62
+ " * logger - Logger instance",
63
+ " * https://backstage.forgerock.com/docs/am/7/scripting-guide/scripting-api-global-logger.html#scripting-api-global-logger.",
64
+ " * Corresponding log files will be prefixed with: scripts.<script name>",
65
+ " *",
66
+ " * Throws SAML2Exception (7):",
67
+ " * for any exceptions occurring in the adapter. The federation process will continue",
68
+ " *",
69
+ " * Class reference:",
70
+ " * (1) idpAdapterScriptHelper - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/plugins/scripted/IdpAdapterScriptHelper.html.",
71
+ " * (2) HttpServletRequest - https://tomcat.apache.org/tomcat-7.0-doc/servletapi/javax/servlet/http/HttpServletRequest.html.",
72
+ " * (3) HttpServletResponse - https://tomcat.apache.org/tomcat-7.0-doc/servletapi/javax/servlet/http/HttpServletResponse.html.",
73
+ " * (4) AuthnRequest - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/protocol/AuthnRequest.html.",
74
+ " * (5) Response - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/protocol/Response.html.",
75
+ " * (6) SSOToken - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/iplanet/sso/SSOToken.html.",
76
+ " * (7) SAML2Exception - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/common/SAML2Exception.html.",
77
+ " */",
78
+ "",
79
+ "/*",
80
+ " * Template/default script for SAML2 IDP Adapter scripted plugin.",
81
+ " */",
82
+ "",
83
+ "/*",
84
+ " * Available variables for preSingleSignOn:",
85
+ " * hostedEntityId",
86
+ " * realm",
87
+ " * idpAdapterScriptHelper",
88
+ " * request",
89
+ " * authnRequest",
90
+ " * response",
91
+ " * reqId",
92
+ " * logger",
93
+ " *",
94
+ " * Return - true if browser redirection is happening after processing, false otherwise. Default to false.",
95
+ " */",
96
+ "function preSingleSignOn () {",
97
+ " logger.error(\"Chicago: preSingleSignOn\");",
98
+ " return true;",
99
+ "}",
100
+ "",
101
+ "/*",
102
+ " * Available variables for preAuthentication:",
103
+ " * hostedEntityId",
104
+ " * realm",
105
+ " * idpAdapterScriptHelper",
106
+ " * request",
107
+ " * authnRequest",
108
+ " * response",
109
+ " * reqId",
110
+ " * session",
111
+ " * relayState",
112
+ " * logger",
113
+ " *",
114
+ " * Return - true if browser redirection is happening after processing, false otherwise. Default to false.",
115
+ " */",
116
+ "function preAuthentication () {",
117
+ " logger.error(\"Chicago: preAuthentication\");",
118
+ " return true;",
119
+ "}",
120
+ "",
121
+ "/*",
122
+ " * Available variables for preSendResponse:",
123
+ " * hostedEntityId",
124
+ " * realm",
125
+ " * idpAdapterScriptHelper",
126
+ " * request",
127
+ " * authnRequest",
128
+ " * response",
129
+ " * reqId",
130
+ " * session",
131
+ " * relayState",
132
+ " * logger",
133
+ " *",
134
+ " * Return - true if browser redirection happened after processing, false otherwise. Default to false.",
135
+ " */",
136
+ "function preSendResponse () {",
137
+ " logger.error(\"Chicago: preSendResponse\");",
138
+ " logger.error(\"Chicago: authnRequest: \"+authnRequest);",
139
+ " response.sendRedirect(\"https://idc.scheuber.io/am/XUI/?realm=alpha&authIndexType=service&authIndexValue=Dispatcher&ForceAuth=true&goto=\"+relayState);",
140
+ " return true;",
141
+ "}",
142
+ "",
143
+ "/*",
144
+ " * Available variables for preSignResponse:",
145
+ " * hostedEntityId",
146
+ " * realm",
147
+ " * idpAdapterScriptHelper",
148
+ " * request",
149
+ " * authnRequest",
150
+ " * session",
151
+ " * relayState",
152
+ " * res",
153
+ " * logger",
154
+ " */",
155
+ "function preSignResponse () {",
156
+ " logger.error(\"Chicago: preSignResponse\");",
157
+ "}",
158
+ "",
159
+ "/*",
160
+ " * Available variables for preSendFailureResponse:",
161
+ " * hostedEntityId",
162
+ " * realm",
163
+ " * idpAdapterScriptHelper",
164
+ " * request",
165
+ " * response",
166
+ " * faultCode",
167
+ " * faultDetail",
168
+ " * logger",
169
+ " */",
170
+ "function preSendFailureResponse () {",
171
+ " logger.error(\"Chicago: preSendFailureResponse\");",
172
+ "}"
173
+ ],
174
+ "default": false,
175
+ "language": "JAVASCRIPT",
176
+ "context": "SAML2_IDP_ADAPTER",
177
+ "createdBy": "null",
178
+ "creationDate": 0,
179
+ "lastModifiedBy": "null",
180
+ "lastModifiedDate": 0
181
+ },
182
+ "90c4eca5-05f0-42f5-b9bf-88b693eabbbd": {
183
+ "_id": "90c4eca5-05f0-42f5-b9bf-88b693eabbbd",
184
+ "name": "Saml2 IDP Attribute Mapper Script",
185
+ "description": null,
186
+ "script": [
187
+ "/*",
188
+ " * Copyright 2021 ForgeRock AS. All Rights Reserved",
189
+ " * Use of this code requires a commercial software license with ForgeRock AS.",
190
+ " * or with one of its affiliates. All use shall be exclusively subject",
191
+ " * to such license between the licensee and ForgeRock AS.",
192
+ " */",
193
+ "",
194
+ "/*",
195
+ " * This script returns a list of SAML Attribute objects for the IDP framework to insert into the generated Assertion.",
196
+ " *",
197
+ " * Defined variables:",
198
+ " * session - SSOToken (1)",
199
+ " * The single sign-on session.",
200
+ " * hostedEntityId - String (primitive).",
201
+ " * The hosted entity ID.",
202
+ " * remoteEntityId - String (primitive).",
203
+ " * The remote entity ID.",
204
+ " * realm - String (primitive).",
205
+ " * The name of the realm the user is authenticating to.",
206
+ " * logger - Always present, the debug logger instance:",
207
+ " * https://backstage.forgerock.com/docs/am/7/scripting-guide/scripting-api-global-logger.html#scripting-api-global-logger.",
208
+ " * Corresponding log files will be prefixed with: scripts.SAML2_IDP_ATTRIBUTE_MAPPER",
209
+ " * idpAttributeMapperScriptHelper - IdpAttributeMapperScriptHelper (2)",
210
+ " * - An IdpAttributeMapperScriptHelper instance containing methods used for IDP attribute mapping.",
211
+ " *",
212
+ " * Throws SAML2Exception:",
213
+ " * - on failing to map the IDP attributes.",
214
+ " *",
215
+ " * Return - a list of SAML Attribute (3) objects.",
216
+ " *",
217
+ " * Class reference:",
218
+ " * (1) SSOToken - https://backstage.forgerock.com/docs/am/7/apidocs/com/iplanet/sso/SSOToken.html.",
219
+ " * (2) IdpAttributeMapperScriptHelper - https://backstage.forgerock.com/docs/am/7/apidocs/com/sun/identity/saml2/plugins/scripted/IdpAttributeMapperScriptHelper.html.",
220
+ " * (3) Attribute - https://backstage.forgerock.com/docs/am/7/apidocs/com/sun/identity/saml2/assertion/Attribute.html.",
221
+ " */",
222
+ "",
223
+ "/**",
224
+ " * Default SAML2 IDP Attribute Mapper.",
225
+ " */",
226
+ "function getAttributes() {",
227
+ " var frJava = JavaImporter(",
228
+ " com.sun.identity.saml2.common.SAML2Exception",
229
+ " );",
230
+ "",
231
+ " const debugMethod = \"ScriptedIDPAttributeMapper.getAttributes:: \";",
232
+ "",
233
+ " try {",
234
+ "",
235
+ " if (!idpAttributeMapperScriptHelper.isSessionValid(session)) {",
236
+ " logger.error(debugMethod + \"Invalid session.\");",
237
+ " return null;",
238
+ " }",
239
+ "",
240
+ " var configMap = idpAttributeMapperScriptHelper.getRemoteSPConfigAttributeMap(realm, remoteEntityId);",
241
+ " logger.message(debugMethod + \"Remote SP attribute map = {}\", configMap);",
242
+ " if (configMap == null || configMap.isEmpty()) {",
243
+ " configMap = idpAttributeMapperScriptHelper.getHostedIDPConfigAttributeMap(realm, hostedEntityId);",
244
+ " if (configMap == null || configMap.isEmpty()) {",
245
+ " logger.message(debugMethod + \"Configuration map is not defined.\");",
246
+ " return null;",
247
+ " }",
248
+ " logger.message(debugMethod + \"Hosted IDP attribute map = {}\", configMap);",
249
+ " }",
250
+ "",
251
+ " var attributes = new java.util.ArrayList();",
252
+ " var stringValueMap = new java.util.HashSet();",
253
+ " var binaryValueMap;",
254
+ " var localAttribute;",
255
+ "",
256
+ " // Don't try to read the attributes from the datastore if the ignored profile is enabled in this realm.",
257
+ " if (!idpAttributeMapperScriptHelper.isIgnoredProfile(session, realm)) {",
258
+ " try {",
259
+ " // Resolve attributes to be read from the datastore.",
260
+ " var stringAttributes = new java.util.HashSet();",
261
+ " var binaryAttributes = new java.util.HashSet();",
262
+ " var keyIter = configMap.keySet().iterator();",
263
+ " while (keyIter.hasNext()) {",
264
+ " var key = keyIter.next();",
265
+ " localAttribute = configMap.get(key);",
266
+ " if (!idpAttributeMapperScriptHelper.isStaticAttribute(localAttribute)) {",
267
+ " if (idpAttributeMapperScriptHelper.isBinaryAttribute(localAttribute)) {",
268
+ " // add it to the list of attributes to treat as being binary",
269
+ " binaryAttributes.add(idpAttributeMapperScriptHelper.removeBinaryAttributeFlag(localAttribute));",
270
+ " } else {",
271
+ " stringAttributes.add(localAttribute);",
272
+ " }",
273
+ " }",
274
+ " }",
275
+ "",
276
+ " if (!stringAttributes.isEmpty()) {",
277
+ " stringValueMap = idpAttributeMapperScriptHelper.getAttributes(session, stringAttributes);",
278
+ " }",
279
+ " if (!binaryAttributes.isEmpty()) {",
280
+ " binaryValueMap = idpAttributeMapperScriptHelper.getBinaryAttributes(session, binaryAttributes);",
281
+ " }",
282
+ " } catch (error) {",
283
+ " logger.error(debugMethod + \"Error accessing the datastore. \" + error);",
284
+ " //continue to check in ssotoken.",
285
+ " }",
286
+ " }",
287
+ "",
288
+ " var keyIter = configMap.keySet().iterator();",
289
+ " while (keyIter.hasNext()) {",
290
+ " var key = keyIter.next()",
291
+ " var nameFormat = null;",
292
+ " var samlAttribute = key;",
293
+ " localAttribute = configMap.get(key);",
294
+ " // check if samlAttribute has format nameFormat|samlAttribute",
295
+ " var samlAttributes = String(new java.lang.String(samlAttribute));",
296
+ " var tokens = samlAttributes.split('|');",
297
+ "",
298
+ " if (tokens.length > 1) {",
299
+ " nameFormat = tokens[0];",
300
+ " samlAttribute = tokens[1];",
301
+ " }",
302
+ "",
303
+ " var attributeValues = new java.util.HashSet();",
304
+ " if (idpAttributeMapperScriptHelper.isStaticAttribute(localAttribute)) {",
305
+ " // Remove the static flag before using it as the static value",
306
+ " localAttribute = idpAttributeMapperScriptHelper.removeStaticAttributeFlag(localAttribute);",
307
+ " attributeValues = new java.util.HashSet([localAttribute]);",
308
+ " logger.message(debugMethod + \"Adding static value {} for attribute named {}\", localAttribute, samlAttribute);",
309
+ " } else {",
310
+ " if (idpAttributeMapperScriptHelper.isBinaryAttribute(localAttribute)) {",
311
+ " // Remove the flag as not used for lookup",
312
+ " localAttribute = idpAttributeMapperScriptHelper.removeBinaryAttributeFlag(localAttribute);",
313
+ " attributeValues = idpAttributeMapperScriptHelper.getBinaryAttributeValues(samlAttribute, localAttribute,",
314
+ " binaryValueMap);",
315
+ " } else {",
316
+ " if (stringValueMap != null && !stringValueMap.isEmpty()) {",
317
+ " attributeValues = stringValueMap.get(localAttribute);",
318
+ " } else {",
319
+ " logger.message(debugMethod + \"{} string value map was empty or null.\", localAttribute);",
320
+ " }",
321
+ " }",
322
+ "",
323
+ " // If all else fails, try to get the value from the users ssoToken",
324
+ " if (attributeValues == null || attributeValues.isEmpty()) {",
325
+ " logger.message(debugMethod + \"User profile does not have value for {}, checking SSOToken.\", localAttribute);",
326
+ " attributeValues = new java.util.HashSet(idpAttributeMapperScriptHelper.getPropertySet(session, localAttribute));",
327
+ " }",
328
+ " }",
329
+ "",
330
+ " if (attributeValues == null || attributeValues.isEmpty()) {",
331
+ " logger.message(debugMethod + \"{} not found in user profile or SSOToken.\", localAttribute);",
332
+ " } else {",
333
+ " attributes.add(idpAttributeMapperScriptHelper.createSAMLAttribute(samlAttribute, nameFormat, attributeValues));",
334
+ " }",
335
+ " }",
336
+ "",
337
+ " return attributes;",
338
+ "",
339
+ " } catch (error) {",
340
+ " logger.error(debugMethod + \"Error mapping IDP attributes. \" + error);",
341
+ " throw new frJava.SAML2Exception(error);",
342
+ " }",
343
+ "}",
344
+ "",
345
+ "getAttributes();"
346
+ ],
347
+ "default": false,
348
+ "language": "JAVASCRIPT",
349
+ "context": "SAML2_IDP_ATTRIBUTE_MAPPER",
350
+ "createdBy": "null",
351
+ "creationDate": 0,
352
+ "lastModifiedBy": "null",
353
+ "lastModifiedDate": 0
354
+ },
355
+ "5b29c5b7-b161-4a42-a41f-d6c85316b951": {
356
+ "_id": "5b29c5b7-b161-4a42-a41f-d6c85316b951",
357
+ "name": "Saml2 IDP Adapter Script",
358
+ "description": null,
359
+ "script": [
360
+ "/*",
361
+ " * Copyright 2021 ForgeRock AS. All Rights Reserved",
362
+ " * Use of this code requires a commercial software license with ForgeRock AS.",
363
+ " * or with one of its affiliates. All use shall be exclusively subject",
364
+ " * to such license between the licensee and ForgeRock AS.",
365
+ " */",
366
+ "",
367
+ "/*",
368
+ " * The script has these top level functions that could be executed during a SAML2 flow.",
369
+ " * - preSingleSignOn",
370
+ " * - preAuthentication",
371
+ " * - preSendResponse",
372
+ " * - preSignResponse",
373
+ " * - preSendFailureResponse",
374
+ " *",
375
+ " * Please see the javadoc for the interface definition and more information about these methods.",
376
+ " * https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/plugins/SAML2IdentityProviderAdapter.html",
377
+ " * Note that the initialize method is not supported in the scripts.",
378
+ " *",
379
+ " * Defined variables. Check the documentation on the respective functions for the variables available to it.",
380
+ " *",
381
+ " * hostedEntityId - String",
382
+ " * Entity ID for the hosted IDP",
383
+ " * realm - String",
384
+ " * Realm of the hosted IDP",
385
+ " * idpAdapterScriptHelper - IdpAdapterScriptHelper (1)",
386
+ " * An instance of IdpAdapterScriptHelper containing helper methods. See Javadoc for more details.",
387
+ " * request - HttpServletRequest (2)",
388
+ " * Servlet request object",
389
+ " * response - HttpServletResponse (3)",
390
+ " * Servlet response object",
391
+ " * authnRequest - AuthnRequest (4)",
392
+ " * The original authentication request sent from SP",
393
+ " * reqId - String",
394
+ " * The id to use for continuation of processing if the adapter redirects",
395
+ " * res - Response (5)",
396
+ " * The SAML Response",
397
+ " * session - SSOToken (6)",
398
+ " * The single sign-on session. The reference type of this is Object and would need to be casted to SSOToken.",
399
+ " * relayState - String",
400
+ " * The relayState that will be used in the redirect",
401
+ " * faultCode - String",
402
+ " * the fault code that will be returned in the SAML response",
403
+ " * faultDetail - String",
404
+ " * the fault detail that will be returned in the SAML response",
405
+ " * logger - Logger instance",
406
+ " * https://backstage.forgerock.com/docs/am/7/scripting-guide/scripting-api-global-logger.html#scripting-api-global-logger.",
407
+ " * Corresponding log files will be prefixed with: scripts.<script name>",
408
+ " *",
409
+ " * Throws SAML2Exception (7):",
410
+ " * for any exceptions occurring in the adapter. The federation process will continue",
411
+ " *",
412
+ " * Class reference:",
413
+ " * (1) idpAdapterScriptHelper - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/plugins/scripted/IdpAdapterScriptHelper.html.",
414
+ " * (2) HttpServletRequest - https://tomcat.apache.org/tomcat-7.0-doc/servletapi/javax/servlet/http/HttpServletRequest.html.",
415
+ " * (3) HttpServletResponse - https://tomcat.apache.org/tomcat-7.0-doc/servletapi/javax/servlet/http/HttpServletResponse.html.",
416
+ " * (4) AuthnRequest - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/protocol/AuthnRequest.html.",
417
+ " * (5) Response - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/protocol/Response.html.",
418
+ " * (6) SSOToken - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/iplanet/sso/SSOToken.html.",
419
+ " * (7) SAML2Exception - https://backstage.forgerock.com/docs/am/7.2/apidocs/com/sun/identity/saml2/common/SAML2Exception.html.",
420
+ " */",
421
+ "",
422
+ "/*",
423
+ " * Template/default script for SAML2 IDP Adapter scripted plugin.",
424
+ " */",
425
+ "",
426
+ "/*",
427
+ " * Available variables for preSingleSignOn:",
428
+ " * hostedEntityId",
429
+ " * realm",
430
+ " * idpAdapterScriptHelper",
431
+ " * request",
432
+ " * authnRequest",
433
+ " * response",
434
+ " * reqId",
435
+ " * logger",
436
+ " *",
437
+ " * Return - true if browser redirection is happening after processing, false otherwise. Default to false.",
438
+ " */",
439
+ "function preSingleSignOn () {",
440
+ " return false;",
441
+ "}",
442
+ "",
443
+ "/*",
444
+ " * Available variables for preAuthentication:",
445
+ " * hostedEntityId",
446
+ " * realm",
447
+ " * idpAdapterScriptHelper",
448
+ " * request",
449
+ " * authnRequest",
450
+ " * response",
451
+ " * reqId",
452
+ " * session",
453
+ " * relayState",
454
+ " * logger",
455
+ " *",
456
+ " * Return - true if browser redirection is happening after processing, false otherwise. Default to false.",
457
+ " */",
458
+ "function preAuthentication () {",
459
+ " return false;",
460
+ "}",
461
+ "",
462
+ "/*",
463
+ " * Available variables for preSendResponse:",
464
+ " * hostedEntityId",
465
+ " * realm",
466
+ " * idpAdapterScriptHelper",
467
+ " * request",
468
+ " * authnRequest",
469
+ " * response",
470
+ " * reqId",
471
+ " * session",
472
+ " * relayState",
473
+ " * logger",
474
+ " *",
475
+ " * Return - true if browser redirection happened after processing, false otherwise. Default to false.",
476
+ " */",
477
+ "function preSendResponse () {",
478
+ " return false;",
479
+ "}",
480
+ "",
481
+ "/*",
482
+ " * Available variables for preSignResponse:",
483
+ " * hostedEntityId",
484
+ " * realm",
485
+ " * idpAdapterScriptHelper",
486
+ " * request",
487
+ " * authnRequest",
488
+ " * session",
489
+ " * relayState",
490
+ " * res",
491
+ " * logger",
492
+ " */",
493
+ "function preSignResponse () {",
494
+ "}",
495
+ "",
496
+ "/*",
497
+ " * Available variables for preSendFailureResponse:",
498
+ " * hostedEntityId",
499
+ " * realm",
500
+ " * idpAdapterScriptHelper",
501
+ " * request",
502
+ " * response",
503
+ " * faultCode",
504
+ " * faultDetail",
505
+ " * logger",
506
+ " */",
507
+ "function preSendFailureResponse () {",
508
+ "}"
509
+ ],
510
+ "default": false,
511
+ "language": "JAVASCRIPT",
512
+ "context": "SAML2_IDP_ADAPTER",
513
+ "createdBy": "null",
514
+ "creationDate": 0,
515
+ "lastModifiedBy": "null",
516
+ "lastModifiedDate": 0
517
+ }
518
+ },
519
+ "saml": {
520
+ "hosted": {
521
+ "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQXp1cmU": {
522
+ "_id": "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQXp1cmU",
523
+ "_rev": "1637076051",
524
+ "entityId": "https://idc.scheuber.io/am/saml2/IDPAzure",
525
+ "identityProvider": {
526
+ "assertionContent": {
527
+ "signingAndEncryption": {
528
+ "requestResponseSigning": {
529
+ "authenticationRequest": false,
530
+ "artifactResolve": false,
531
+ "logoutRequest": false,
532
+ "logoutResponse": false,
533
+ "manageNameIdRequest": false,
534
+ "manageNameIdResponse": false
535
+ },
536
+ "encryption": {
537
+ "nameIdEncryption": false
538
+ },
539
+ "secretIdAndAlgorithms": {}
540
+ },
541
+ "nameIdFormat": {
542
+ "nameIdFormatList": [
543
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
544
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
545
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
546
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",
547
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName",
548
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos",
549
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName"
550
+ ],
551
+ "nameIdValueMap": [
552
+ {
553
+ "key": "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
554
+ "value": "mail",
555
+ "binary": false
556
+ },
557
+ {
558
+ "key": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
559
+ "value": "mail",
560
+ "binary": false
561
+ }
562
+ ]
563
+ },
564
+ "authenticationContext": {
565
+ "authenticationContextMapper": "com.sun.identity.saml2.plugins.DefaultIDPAuthnContextMapper",
566
+ "authContextItems": [
567
+ {
568
+ "contextReference": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
569
+ "key": "service",
570
+ "value": "Login",
571
+ "level": 0
572
+ }
573
+ ]
574
+ },
575
+ "assertionTime": {
576
+ "notBeforeTimeSkew": 600,
577
+ "effectiveTime": 600
578
+ },
579
+ "basicAuthentication": {
580
+ "enabled": false
581
+ },
582
+ "assertionCache": {
583
+ "enabled": false
584
+ }
585
+ },
586
+ "assertionProcessing": {
587
+ "attributeMapper": {
588
+ "attributeMapper": "com.sun.identity.saml2.plugins.DefaultIDPAttributeMapper",
589
+ "attributeMap": [
590
+ {
591
+ "samlAttribute": "IDPEmail",
592
+ "localAttribute": "mail",
593
+ "binary": false
594
+ },
595
+ {
596
+ "samlAttribute": "UOPClassID",
597
+ "localAttribute": "UOPClassID",
598
+ "binary": false
599
+ }
600
+ ]
601
+ },
602
+ "accountMapper": {
603
+ "accountMapper": "com.sun.identity.saml2.plugins.DefaultIDPAccountMapper",
604
+ "disableNameIdPersistence": true
605
+ },
606
+ "localConfiguration": {
607
+ "authUrl": ""
608
+ }
609
+ },
610
+ "services": {
611
+ "metaAlias": "/alpha/IDPAzure",
612
+ "serviceAttributes": {
613
+ "artifactResolutionService": [
614
+ {
615
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
616
+ "location": "https://idc.scheuber.io/am/ArtifactResolver/metaAlias/alpha/IDPAzure"
617
+ }
618
+ ],
619
+ "singleLogoutService": [
620
+ {
621
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
622
+ "location": "https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPAzure",
623
+ "responseLocation": "https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPAzure"
624
+ },
625
+ {
626
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
627
+ "location": "https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPAzure",
628
+ "responseLocation": "https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPAzure"
629
+ },
630
+ {
631
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
632
+ "location": "https://idc.scheuber.io/am/IDPSloSoap/metaAlias/alpha/IDPAzure"
633
+ }
634
+ ],
635
+ "nameIdService": [
636
+ {
637
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
638
+ "location": "https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPAzure",
639
+ "responseLocation": "https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPAzure"
640
+ },
641
+ {
642
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
643
+ "location": "https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPAzure",
644
+ "responseLocation": "https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPAzure"
645
+ },
646
+ {
647
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
648
+ "location": "https://idc.scheuber.io/am/IDPMniSoap/metaAlias/alpha/IDPAzure"
649
+ }
650
+ ],
651
+ "singleSignOnService": [
652
+ {
653
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
654
+ "location": "https://idc.scheuber.io/am/SSORedirect/metaAlias/alpha/IDPAzure"
655
+ },
656
+ {
657
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
658
+ "location": "https://idc.scheuber.io/am/SSOPOST/metaAlias/alpha/IDPAzure"
659
+ },
660
+ {
661
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
662
+ "location": "https://idc.scheuber.io/am/SSOSoap/metaAlias/alpha/IDPAzure"
663
+ }
664
+ ]
665
+ },
666
+ "nameIdMapping": [
667
+ {
668
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
669
+ "location": "https://idc.scheuber.io/am/NIMSoap/metaAlias/alpha/IDPAzure"
670
+ }
671
+ ],
672
+ "assertionIdRequest": [
673
+ {
674
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
675
+ "location": "https://idc.scheuber.io/am/AIDReqSoap/IDPRole/metaAlias/alpha/IDPAzure"
676
+ },
677
+ {
678
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:URI",
679
+ "location": "https://idc.scheuber.io/am/AIDReqUri/IDPRole/metaAlias/alpha/IDPAzure"
680
+ }
681
+ ]
682
+ },
683
+ "advanced": {
684
+ "saeConfiguration": {
685
+ "idpUrl": "https://idc.scheuber.io/am/idpsaehandler/metaAlias/alpha/IDPAzure"
686
+ },
687
+ "ecpConfiguration": {
688
+ "idpSessionMapper": "com.sun.identity.saml2.plugins.DefaultIDPECPSessionMapper"
689
+ },
690
+ "sessionSynchronization": {
691
+ "enabled": false
692
+ },
693
+ "idpFinderImplementation": {
694
+ "enableProxyIdpFinderForAllSps": false
695
+ },
696
+ "relayStateUrlList": {},
697
+ "idpAdapter": {
698
+ "idpAdapterScript": "85523e71-2d77-4577-b078-6f9674cc54e2"
699
+ }
700
+ }
701
+ }
702
+ },
703
+ "U1BBenVyZQ": {
704
+ "_id": "U1BBenVyZQ",
705
+ "_rev": "-1930164078",
706
+ "entityId": "SPAzure",
707
+ "serviceProvider": {
708
+ "assertionContent": {
709
+ "signingAndEncryption": {
710
+ "requestResponseSigning": {},
711
+ "encryption": {},
712
+ "secretIdAndAlgorithms": {}
713
+ },
714
+ "nameIdFormat": {
715
+ "nameIdFormatList": [
716
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
717
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
718
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
719
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",
720
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName",
721
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos",
722
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName"
723
+ ]
724
+ },
725
+ "authenticationContext": {
726
+ "authenticationContextMapper": "com.sun.identity.saml2.plugins.DefaultSPAuthnContextMapper",
727
+ "authContextItems": [
728
+ {
729
+ "contextReference": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
730
+ "level": 0,
731
+ "defaultItem": true
732
+ }
733
+ ],
734
+ "authenticationComparisonType": "Exact",
735
+ "includeRequestedAuthenticationContext": true
736
+ },
737
+ "assertionTimeSkew": 300,
738
+ "basicAuthentication": {}
739
+ },
740
+ "assertionProcessing": {
741
+ "attributeMapper": {
742
+ "attributeMapper": "com.sun.identity.saml2.plugins.DefaultSPAttributeMapper",
743
+ "attributeMap": [
744
+ {
745
+ "key": "http://schemas.microsoft.com/identity/claims/displayname",
746
+ "value": "cn"
747
+ },
748
+ {
749
+ "key": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname",
750
+ "value": "givenName"
751
+ },
752
+ {
753
+ "key": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname",
754
+ "value": "sn"
755
+ },
756
+ {
757
+ "key": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
758
+ "value": "mail"
759
+ },
760
+ {
761
+ "key": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
762
+ "value": "uid"
763
+ }
764
+ ]
765
+ },
766
+ "autoFederation": {
767
+ "autoFedEnabled": false
768
+ },
769
+ "accountMapping": {
770
+ "spAccountMapper": "com.sun.identity.saml2.plugins.DefaultSPAccountMapper",
771
+ "useNameIDAsSPUserID": true
772
+ },
773
+ "responseArtifactMessageEncoding": {
774
+ "encoding": "URI"
775
+ },
776
+ "url": {},
777
+ "defaultRelayState": "https://idc.scheuber.io/enduser/?realm=alpha#/profile",
778
+ "adapter": {}
779
+ },
780
+ "services": {
781
+ "metaAlias": "/alpha/SPAzure",
782
+ "serviceAttributes": {
783
+ "singleLogoutService": [
784
+ {
785
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
786
+ "location": "https://idc.scheuber.io/am/SPSloRedirect/metaAlias/alpha/SPAzure",
787
+ "responseLocation": "https://idc.scheuber.io/am/SPSloRedirect/metaAlias/alpha/SPAzure"
788
+ },
789
+ {
790
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
791
+ "location": "https://idc.scheuber.io/am/SPSloPOST/metaAlias/alpha/SPAzure",
792
+ "responseLocation": "https://idc.scheuber.io/am/SPSloPOST/metaAlias/alpha/SPAzure"
793
+ },
794
+ {
795
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
796
+ "location": "https://idc.scheuber.io/am/SPSloSoap/metaAlias/alpha/SPAzure"
797
+ }
798
+ ],
799
+ "nameIdService": [
800
+ {
801
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
802
+ "location": "https://idc.scheuber.io/am/SPMniRedirect/metaAlias/alpha/SPAzure",
803
+ "responseLocation": "https://idc.scheuber.io/am/SPMniRedirect/metaAlias/alpha/SPAzure"
804
+ },
805
+ {
806
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
807
+ "location": "https://idc.scheuber.io/am/SPMniPOST/metaAlias/alpha/SPAzure",
808
+ "responseLocation": "https://idc.scheuber.io/am/SPMniPOST/metaAlias/alpha/SPAzure"
809
+ },
810
+ {
811
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
812
+ "location": "https://idc.scheuber.io/am/SPMniSoap/metaAlias/alpha/SPAzure",
813
+ "responseLocation": "https://idc.scheuber.io/am/SPMniSoap/metaAlias/alpha/SPAzure"
814
+ }
815
+ ],
816
+ "assertionConsumerService": [
817
+ {
818
+ "isDefault": true,
819
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact",
820
+ "location": "https://idc.scheuber.io/am/Consumer/metaAlias/alpha/SPAzure",
821
+ "index": 0
822
+ },
823
+ {
824
+ "isDefault": false,
825
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
826
+ "location": "https://idc.scheuber.io/am/Consumer/metaAlias/alpha/SPAzure",
827
+ "index": 1
828
+ },
829
+ {
830
+ "isDefault": false,
831
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:PAOS",
832
+ "location": "https://idc.scheuber.io/am/Consumer/ECP/metaAlias/alpha/SPAzure",
833
+ "index": 2
834
+ }
835
+ ]
836
+ }
837
+ },
838
+ "advanced": {
839
+ "saeConfiguration": {
840
+ "spUrl": "https://idc.scheuber.io/am/spsaehandler/metaAlias/alpha/SPAzure"
841
+ },
842
+ "ecpConfiguration": {
843
+ "ecpRequestIdpListFinderImpl": "com.sun.identity.saml2.plugins.ECPIDPFinder"
844
+ },
845
+ "idpProxy": {},
846
+ "relayStateUrlList": {}
847
+ }
848
+ }
849
+ },
850
+ "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQRmVkbGV0": {
851
+ "_id": "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQRmVkbGV0",
852
+ "_rev": "-1020599606",
853
+ "entityId": "https://idc.scheuber.io/am/saml2/IDPFedlet",
854
+ "identityProvider": {
855
+ "assertionContent": {
856
+ "signingAndEncryption": {
857
+ "requestResponseSigning": {},
858
+ "encryption": {},
859
+ "secretIdAndAlgorithms": {}
860
+ },
861
+ "nameIdFormat": {
862
+ "nameIdFormatList": [
863
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
864
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
865
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
866
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",
867
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName",
868
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos",
869
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName"
870
+ ],
871
+ "nameIdValueMap": [
872
+ {
873
+ "key": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
874
+ "value": "mail",
875
+ "binary": false
876
+ }
877
+ ]
878
+ },
879
+ "authenticationContext": {
880
+ "authenticationContextMapper": "com.sun.identity.saml2.plugins.DefaultIDPAuthnContextMapper",
881
+ "authContextItems": [
882
+ {
883
+ "contextReference": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
884
+ "level": 0
885
+ }
886
+ ]
887
+ },
888
+ "assertionTime": {
889
+ "notBeforeTimeSkew": 600,
890
+ "effectiveTime": 600
891
+ },
892
+ "basicAuthentication": {},
893
+ "assertionCache": {}
894
+ },
895
+ "assertionProcessing": {
896
+ "attributeMapper": {
897
+ "attributeMapper": "com.sun.identity.saml2.plugins.DefaultIDPAttributeMapper"
898
+ },
899
+ "accountMapper": {
900
+ "accountMapper": "com.sun.identity.saml2.plugins.DefaultIDPAccountMapper"
901
+ },
902
+ "localConfiguration": {}
903
+ },
904
+ "services": {
905
+ "metaAlias": "/alpha/IDPFedlet",
906
+ "serviceAttributes": {
907
+ "artifactResolutionService": [
908
+ {
909
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
910
+ "location": "https://idc.scheuber.io/am/ArtifactResolver/metaAlias/alpha/IDPFedlet"
911
+ }
912
+ ],
913
+ "singleLogoutService": [
914
+ {
915
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
916
+ "location": "https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPFedlet",
917
+ "responseLocation": "https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPFedlet"
918
+ },
919
+ {
920
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
921
+ "location": "https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPFedlet",
922
+ "responseLocation": "https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPFedlet"
923
+ },
924
+ {
925
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
926
+ "location": "https://idc.scheuber.io/am/IDPSloSoap/metaAlias/alpha/IDPFedlet"
927
+ }
928
+ ],
929
+ "nameIdService": [
930
+ {
931
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
932
+ "location": "https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPFedlet",
933
+ "responseLocation": "https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPFedlet"
934
+ },
935
+ {
936
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
937
+ "location": "https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPFedlet",
938
+ "responseLocation": "https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPFedlet"
939
+ },
940
+ {
941
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
942
+ "location": "https://idc.scheuber.io/am/IDPMniSoap/metaAlias/alpha/IDPFedlet"
943
+ }
944
+ ],
945
+ "singleSignOnService": [
946
+ {
947
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
948
+ "location": "https://idc.scheuber.io/am/SSORedirect/metaAlias/alpha/IDPFedlet"
949
+ },
950
+ {
951
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
952
+ "location": "https://idc.scheuber.io/am/SSOPOST/metaAlias/alpha/IDPFedlet"
953
+ },
954
+ {
955
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
956
+ "location": "https://idc.scheuber.io/am/SSOSoap/metaAlias/alpha/IDPFedlet"
957
+ }
958
+ ]
959
+ },
960
+ "nameIdMapping": [
961
+ {
962
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
963
+ "location": "https://idc.scheuber.io/am/NIMSoap/metaAlias/alpha/IDPFedlet"
964
+ }
965
+ ],
966
+ "assertionIdRequest": [
967
+ {
968
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
969
+ "location": "https://idc.scheuber.io/am/AIDReqSoap/IDPRole/metaAlias/alpha/IDPFedlet"
970
+ },
971
+ {
972
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:URI",
973
+ "location": "https://idc.scheuber.io/am/AIDReqUri/IDPRole/metaAlias/alpha/IDPFedlet"
974
+ }
975
+ ]
976
+ },
977
+ "advanced": {
978
+ "saeConfiguration": {
979
+ "idpUrl": "https://idc.scheuber.io/am/idpsaehandler/metaAlias/alpha/IDPFedlet"
980
+ },
981
+ "ecpConfiguration": {
982
+ "idpSessionMapper": "com.sun.identity.saml2.plugins.DefaultIDPECPSessionMapper"
983
+ },
984
+ "sessionSynchronization": {},
985
+ "idpFinderImplementation": {},
986
+ "relayStateUrlList": {},
987
+ "idpAdapter": {}
988
+ }
989
+ }
990
+ },
991
+ "dm9sa2VyRGV2U1A": {
992
+ "_id": "dm9sa2VyRGV2U1A",
993
+ "_rev": "-1233096083",
994
+ "entityId": "volkerDevSP",
995
+ "serviceProvider": {
996
+ "assertionContent": {
997
+ "signingAndEncryption": {
998
+ "requestResponseSigning": {},
999
+ "encryption": {},
1000
+ "secretIdAndAlgorithms": {}
1001
+ },
1002
+ "nameIdFormat": {
1003
+ "nameIdFormatList": [
1004
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
1005
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
1006
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
1007
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",
1008
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName",
1009
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos",
1010
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName"
1011
+ ]
1012
+ },
1013
+ "authenticationContext": {
1014
+ "authenticationContextMapper": "com.sun.identity.saml2.plugins.DefaultSPAuthnContextMapper",
1015
+ "authContextItems": [
1016
+ {
1017
+ "contextReference": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
1018
+ "level": 0,
1019
+ "defaultItem": true
1020
+ }
1021
+ ],
1022
+ "authenticationComparisonType": "Exact",
1023
+ "includeRequestedAuthenticationContext": true
1024
+ },
1025
+ "assertionTimeSkew": 300,
1026
+ "basicAuthentication": {}
1027
+ },
1028
+ "assertionProcessing": {
1029
+ "attributeMapper": {
1030
+ "attributeMapper": "com.sun.identity.saml2.plugins.DefaultSPAttributeMapper",
1031
+ "attributeMap": [
1032
+ {
1033
+ "key": "*",
1034
+ "value": "*"
1035
+ }
1036
+ ]
1037
+ },
1038
+ "autoFederation": {
1039
+ "autoFedEnabled": false
1040
+ },
1041
+ "accountMapping": {
1042
+ "spAccountMapper": "com.sun.identity.saml2.plugins.DefaultSPAccountMapper",
1043
+ "useNameIDAsSPUserID": true
1044
+ },
1045
+ "responseArtifactMessageEncoding": {
1046
+ "encoding": "URI"
1047
+ },
1048
+ "url": {},
1049
+ "adapter": {}
1050
+ },
1051
+ "services": {
1052
+ "metaAlias": "/alpha/volkerDevSP",
1053
+ "serviceAttributes": {
1054
+ "singleLogoutService": [
1055
+ {
1056
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1057
+ "location": "https://openam-volker-dev.forgeblocks.com/am/SPSloRedirect/metaAlias/alpha/volkerDevSP",
1058
+ "responseLocation": "https://openam-volker-dev.forgeblocks.com/am/SPSloRedirect/metaAlias/alpha/volkerDevSP"
1059
+ },
1060
+ {
1061
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1062
+ "location": "https://openam-volker-dev.forgeblocks.com/am/SPSloPOST/metaAlias/alpha/volkerDevSP",
1063
+ "responseLocation": "https://openam-volker-dev.forgeblocks.com/am/SPSloPOST/metaAlias/alpha/volkerDevSP"
1064
+ },
1065
+ {
1066
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1067
+ "location": "https://openam-volker-dev.forgeblocks.com/am/SPSloSoap/metaAlias/alpha/volkerDevSP"
1068
+ }
1069
+ ],
1070
+ "nameIdService": [
1071
+ {
1072
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1073
+ "location": "https://openam-volker-dev.forgeblocks.com/am/SPMniPOST/metaAlias/alpha/volkerDevSP",
1074
+ "responseLocation": "https://openam-volker-dev.forgeblocks.com/am/SPMniPOST/metaAlias/alpha/volkerDevSP"
1075
+ },
1076
+ {
1077
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1078
+ "location": "https://openam-volker-dev.forgeblocks.com/am/SPMniRedirect/metaAlias/alpha/volkerDevSP",
1079
+ "responseLocation": "https://openam-volker-dev.forgeblocks.com/am/SPMniRedirect/metaAlias/alpha/volkerDevSP"
1080
+ },
1081
+ {
1082
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1083
+ "location": "https://openam-volker-dev.forgeblocks.com/am/SPMniSoap/metaAlias/alpha/volkerDevSP",
1084
+ "responseLocation": "https://openam-volker-dev.forgeblocks.com/am/SPMniSoap/metaAlias/alpha/volkerDevSP"
1085
+ }
1086
+ ],
1087
+ "assertionConsumerService": [
1088
+ {
1089
+ "isDefault": true,
1090
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1091
+ "location": "https://openam-volker-dev.forgeblocks.com/am/Consumer/metaAlias/alpha/volkerDevSP",
1092
+ "index": 1
1093
+ }
1094
+ ]
1095
+ }
1096
+ },
1097
+ "advanced": {
1098
+ "saeConfiguration": {
1099
+ "spUrl": "https://openam-volker-dev.forgeblocks.com/am/spsaehandler/metaAlias/alpha/volkerDevSP"
1100
+ },
1101
+ "ecpConfiguration": {
1102
+ "ecpRequestIdpListFinderImpl": "com.sun.identity.saml2.plugins.ECPIDPFinder"
1103
+ },
1104
+ "idpProxy": {},
1105
+ "relayStateUrlList": {}
1106
+ }
1107
+ }
1108
+ },
1109
+ "aVNQQXp1cmU": {
1110
+ "_id": "aVNQQXp1cmU",
1111
+ "_rev": "1379466460",
1112
+ "entityId": "iSPAzure",
1113
+ "serviceProvider": {
1114
+ "assertionContent": {
1115
+ "signingAndEncryption": {
1116
+ "requestResponseSigning": {},
1117
+ "encryption": {},
1118
+ "secretIdAndAlgorithms": {}
1119
+ },
1120
+ "nameIdFormat": {
1121
+ "nameIdFormatList": [
1122
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
1123
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
1124
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
1125
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",
1126
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName",
1127
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos",
1128
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName"
1129
+ ]
1130
+ },
1131
+ "authenticationContext": {
1132
+ "authenticationContextMapper": "com.sun.identity.saml2.plugins.DefaultSPAuthnContextMapper",
1133
+ "authContextItems": [
1134
+ {
1135
+ "contextReference": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
1136
+ "level": 0,
1137
+ "defaultItem": true
1138
+ }
1139
+ ],
1140
+ "authenticationComparisonType": "Exact",
1141
+ "includeRequestedAuthenticationContext": true
1142
+ },
1143
+ "assertionTimeSkew": 300,
1144
+ "basicAuthentication": {}
1145
+ },
1146
+ "assertionProcessing": {
1147
+ "attributeMapper": {
1148
+ "attributeMapper": "com.sun.identity.saml2.plugins.DefaultSPAttributeMapper",
1149
+ "attributeMap": [
1150
+ {
1151
+ "key": "http://schemas.microsoft.com/identity/claims/displayname",
1152
+ "value": "cn"
1153
+ },
1154
+ {
1155
+ "key": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname",
1156
+ "value": "givenName"
1157
+ },
1158
+ {
1159
+ "key": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname",
1160
+ "value": "sn"
1161
+ },
1162
+ {
1163
+ "key": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",
1164
+ "value": "mail"
1165
+ },
1166
+ {
1167
+ "key": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name",
1168
+ "value": "uid"
1169
+ }
1170
+ ]
1171
+ },
1172
+ "autoFederation": {
1173
+ "autoFedEnabled": false
1174
+ },
1175
+ "accountMapping": {
1176
+ "spAccountMapper": "com.sun.identity.saml2.plugins.DefaultSPAccountMapper",
1177
+ "useNameIDAsSPUserID": true
1178
+ },
1179
+ "responseArtifactMessageEncoding": {
1180
+ "encoding": "URI"
1181
+ },
1182
+ "url": {},
1183
+ "adapter": {}
1184
+ },
1185
+ "services": {
1186
+ "metaAlias": "/alpha/iSPAzure",
1187
+ "serviceAttributes": {
1188
+ "singleLogoutService": [
1189
+ {
1190
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1191
+ "location": "https://idc.scheuber.io/am/SPSloRedirect/metaAlias/alpha/iSPAzure",
1192
+ "responseLocation": "https://idc.scheuber.io/am/SPSloRedirect/metaAlias/alpha/iSPAzure"
1193
+ },
1194
+ {
1195
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1196
+ "location": "https://idc.scheuber.io/am/SPSloPOST/metaAlias/alpha/iSPAzure",
1197
+ "responseLocation": "https://idc.scheuber.io/am/SPSloPOST/metaAlias/alpha/iSPAzure"
1198
+ },
1199
+ {
1200
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1201
+ "location": "https://idc.scheuber.io/am/SPSloSoap/metaAlias/alpha/iSPAzure"
1202
+ }
1203
+ ],
1204
+ "nameIdService": [
1205
+ {
1206
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1207
+ "location": "https://idc.scheuber.io/am/SPMniRedirect/metaAlias/alpha/iSPAzure",
1208
+ "responseLocation": "https://idc.scheuber.io/am/SPMniRedirect/metaAlias/alpha/iSPAzure"
1209
+ },
1210
+ {
1211
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1212
+ "location": "https://idc.scheuber.io/am/SPMniPOST/metaAlias/alpha/iSPAzure",
1213
+ "responseLocation": "https://idc.scheuber.io/am/SPMniPOST/metaAlias/alpha/iSPAzure"
1214
+ },
1215
+ {
1216
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1217
+ "location": "https://idc.scheuber.io/am/SPMniSoap/metaAlias/alpha/iSPAzure",
1218
+ "responseLocation": "https://idc.scheuber.io/am/SPMniSoap/metaAlias/alpha/iSPAzure"
1219
+ }
1220
+ ],
1221
+ "assertionConsumerService": [
1222
+ {
1223
+ "isDefault": true,
1224
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact",
1225
+ "location": "https://idc.scheuber.io/am/AuthConsumer/metaAlias/alpha/iSPAzure",
1226
+ "index": 0
1227
+ },
1228
+ {
1229
+ "isDefault": false,
1230
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1231
+ "location": "https://idc.scheuber.io/am/AuthConsumer/metaAlias/alpha/iSPAzure",
1232
+ "index": 1
1233
+ },
1234
+ {
1235
+ "isDefault": false,
1236
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:PAOS",
1237
+ "location": "https://idc.scheuber.io/am/Consumer/ECP/metaAlias/alpha/iSPAzure",
1238
+ "index": 2
1239
+ }
1240
+ ]
1241
+ }
1242
+ },
1243
+ "advanced": {
1244
+ "saeConfiguration": {
1245
+ "spUrl": "https://idc.scheuber.io/am/spsaehandler/metaAlias/alpha/iSPAzure"
1246
+ },
1247
+ "ecpConfiguration": {
1248
+ "ecpRequestIdpListFinderImpl": "com.sun.identity.saml2.plugins.ECPIDPFinder"
1249
+ },
1250
+ "idpProxy": {},
1251
+ "relayStateUrlList": {}
1252
+ }
1253
+ }
1254
+ },
1255
+ "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQnJvYWRjb20": {
1256
+ "_id": "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQnJvYWRjb20",
1257
+ "_rev": "-728528736",
1258
+ "entityId": "https://idc.scheuber.io/am/saml2/IDPBroadcom",
1259
+ "identityProvider": {
1260
+ "assertionContent": {
1261
+ "signingAndEncryption": {
1262
+ "requestResponseSigning": {},
1263
+ "encryption": {},
1264
+ "secretIdAndAlgorithms": {}
1265
+ },
1266
+ "nameIdFormat": {
1267
+ "nameIdFormatList": [
1268
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent",
1269
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
1270
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
1271
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",
1272
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName",
1273
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos",
1274
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName"
1275
+ ],
1276
+ "nameIdValueMap": [
1277
+ {
1278
+ "key": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
1279
+ "value": "mail",
1280
+ "binary": false
1281
+ }
1282
+ ]
1283
+ },
1284
+ "authenticationContext": {
1285
+ "authenticationContextMapper": "com.sun.identity.saml2.plugins.DefaultIDPAuthnContextMapper",
1286
+ "authContextItems": [
1287
+ {
1288
+ "contextReference": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
1289
+ "level": 0
1290
+ }
1291
+ ]
1292
+ },
1293
+ "assertionTime": {
1294
+ "notBeforeTimeSkew": 600,
1295
+ "effectiveTime": 600
1296
+ },
1297
+ "basicAuthentication": {},
1298
+ "assertionCache": {}
1299
+ },
1300
+ "assertionProcessing": {
1301
+ "attributeMapper": {
1302
+ "attributeMapper": "com.sun.identity.saml2.plugins.DefaultIDPAttributeMapper",
1303
+ "attributeMapperScript": "90c4eca5-05f0-42f5-b9bf-88b693eabbbd"
1304
+ },
1305
+ "accountMapper": {
1306
+ "accountMapper": "com.sun.identity.saml2.plugins.DefaultIDPAccountMapper",
1307
+ "disableNameIdPersistence": false
1308
+ },
1309
+ "localConfiguration": {}
1310
+ },
1311
+ "services": {
1312
+ "metaAlias": "/alpha/IDPBroadcom",
1313
+ "serviceAttributes": {
1314
+ "artifactResolutionService": [
1315
+ {
1316
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1317
+ "location": "https://idc.scheuber.io/am/ArtifactResolver/metaAlias/alpha/IDPBroadcom"
1318
+ }
1319
+ ],
1320
+ "singleLogoutService": [
1321
+ {
1322
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1323
+ "location": "https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPBroadcom",
1324
+ "responseLocation": "https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPBroadcom"
1325
+ },
1326
+ {
1327
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1328
+ "location": "https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPBroadcom",
1329
+ "responseLocation": "https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPBroadcom"
1330
+ },
1331
+ {
1332
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1333
+ "location": "https://idc.scheuber.io/am/IDPSloSoap/metaAlias/alpha/IDPBroadcom"
1334
+ }
1335
+ ],
1336
+ "nameIdService": [
1337
+ {
1338
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1339
+ "location": "https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPBroadcom",
1340
+ "responseLocation": "https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPBroadcom"
1341
+ },
1342
+ {
1343
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1344
+ "location": "https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPBroadcom",
1345
+ "responseLocation": "https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPBroadcom"
1346
+ },
1347
+ {
1348
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1349
+ "location": "https://idc.scheuber.io/am/IDPMniSoap/metaAlias/alpha/IDPBroadcom"
1350
+ }
1351
+ ],
1352
+ "singleSignOnService": [
1353
+ {
1354
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1355
+ "location": "https://idc.scheuber.io/am/SSORedirect/metaAlias/alpha/IDPBroadcom"
1356
+ },
1357
+ {
1358
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1359
+ "location": "https://idc.scheuber.io/am/SSOPOST/metaAlias/alpha/IDPBroadcom"
1360
+ },
1361
+ {
1362
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1363
+ "location": "https://idc.scheuber.io/am/SSOSoap/metaAlias/alpha/IDPBroadcom"
1364
+ }
1365
+ ]
1366
+ },
1367
+ "nameIdMapping": [
1368
+ {
1369
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1370
+ "location": "https://idc.scheuber.io/am/NIMSoap/metaAlias/alpha/IDPBroadcom"
1371
+ }
1372
+ ],
1373
+ "assertionIdRequest": [
1374
+ {
1375
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1376
+ "location": "https://idc.scheuber.io/am/AIDReqSoap/IDPRole/metaAlias/alpha/IDPBroadcom"
1377
+ },
1378
+ {
1379
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:URI",
1380
+ "location": "https://idc.scheuber.io/am/AIDReqUri/IDPRole/metaAlias/alpha/IDPBroadcom"
1381
+ }
1382
+ ]
1383
+ },
1384
+ "advanced": {
1385
+ "saeConfiguration": {
1386
+ "idpUrl": "https://idc.scheuber.io/am/idpsaehandler/metaAlias/alpha/IDPBroadcom"
1387
+ },
1388
+ "ecpConfiguration": {
1389
+ "idpSessionMapper": "com.sun.identity.saml2.plugins.DefaultIDPECPSessionMapper"
1390
+ },
1391
+ "sessionSynchronization": {
1392
+ "enabled": false
1393
+ },
1394
+ "idpFinderImplementation": {
1395
+ "enableProxyIdpFinderForAllSps": false
1396
+ },
1397
+ "relayStateUrlList": {},
1398
+ "idpAdapter": {
1399
+ "idpAdapterScript": "5b29c5b7-b161-4a42-a41f-d6c85316b951"
1400
+ }
1401
+ }
1402
+ }
1403
+ }
1404
+ },
1405
+ "remote": {
1406
+ "aHR0cHM6Ly9zdHMud2luZG93cy5uZXQvNzExZmZhOWMtNTk3Mi00NzEzLWFjZTMtNjg4Yzk3MzI2MTRhLw": {
1407
+ "_id": "aHR0cHM6Ly9zdHMud2luZG93cy5uZXQvNzExZmZhOWMtNTk3Mi00NzEzLWFjZTMtNjg4Yzk3MzI2MTRhLw",
1408
+ "_rev": "740333789",
1409
+ "entityId": "https://sts.windows.net/711ffa9c-5972-4713-ace3-688c9732614a/",
1410
+ "identityProvider": {
1411
+ "assertionContent": {
1412
+ "signingAndEncryption": {
1413
+ "requestResponseSigning": {},
1414
+ "encryption": {}
1415
+ },
1416
+ "nameIdFormat": {},
1417
+ "basicAuthentication": {}
1418
+ },
1419
+ "services": {
1420
+ "serviceAttributes": {
1421
+ "singleLogoutService": [
1422
+ {
1423
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1424
+ "location": "https://login.microsoftonline.com/711ffa9c-5972-4713-ace3-688c9732614a/saml2"
1425
+ }
1426
+ ],
1427
+ "singleSignOnService": [
1428
+ {
1429
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1430
+ "location": "https://login.microsoftonline.com/711ffa9c-5972-4713-ace3-688c9732614a/saml2"
1431
+ },
1432
+ {
1433
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1434
+ "location": "https://login.microsoftonline.com/711ffa9c-5972-4713-ace3-688c9732614a/saml2"
1435
+ }
1436
+ ]
1437
+ }
1438
+ }
1439
+ }
1440
+ },
1441
+ "aWRw": {
1442
+ "_id": "aWRw",
1443
+ "_rev": "-599047583",
1444
+ "entityId": "idp",
1445
+ "identityProvider": {
1446
+ "assertionContent": {
1447
+ "signingAndEncryption": {
1448
+ "requestResponseSigning": {
1449
+ "authenticationRequest": false
1450
+ },
1451
+ "encryption": {}
1452
+ },
1453
+ "nameIdFormat": {
1454
+ "nameIdFormatList": [
1455
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified"
1456
+ ]
1457
+ },
1458
+ "basicAuthentication": {}
1459
+ },
1460
+ "services": {
1461
+ "serviceAttributes": {
1462
+ "artifactResolutionService": [
1463
+ {
1464
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1465
+ "location": "https://openam-admin-fed.forgeblocks.com/am/ArtifactResolver/metaAlias/alpha/idp"
1466
+ }
1467
+ ],
1468
+ "singleLogoutService": [
1469
+ {
1470
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1471
+ "location": "https://openam-admin-fed.forgeblocks.com/am/IDPSloRedirect/metaAlias/alpha/idp",
1472
+ "responseLocation": "https://openam-admin-fed.forgeblocks.com/am/IDPSloRedirect/metaAlias/alpha/idp"
1473
+ },
1474
+ {
1475
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1476
+ "location": "https://openam-admin-fed.forgeblocks.com/am/IDPSloPOST/metaAlias/alpha/idp",
1477
+ "responseLocation": "https://openam-admin-fed.forgeblocks.com/am/IDPSloPOST/metaAlias/alpha/idp"
1478
+ },
1479
+ {
1480
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1481
+ "location": "https://openam-admin-fed.forgeblocks.com/am/IDPSloSoap/metaAlias/alpha/idp"
1482
+ }
1483
+ ],
1484
+ "nameIdService": [
1485
+ {
1486
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1487
+ "location": "https://openam-admin-fed.forgeblocks.com/am/IDPMniPOST/metaAlias/alpha/idp",
1488
+ "responseLocation": "https://openam-admin-fed.forgeblocks.com/am/IDPMniPOST/metaAlias/alpha/idp"
1489
+ },
1490
+ {
1491
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1492
+ "location": "https://openam-admin-fed.forgeblocks.com/am/IDPMniRedirect/metaAlias/alpha/idp",
1493
+ "responseLocation": "https://openam-admin-fed.forgeblocks.com/am/IDPMniRedirect/metaAlias/alpha/idp"
1494
+ },
1495
+ {
1496
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1497
+ "location": "https://openam-admin-fed.forgeblocks.com/am/IDPMniSoap/metaAlias/alpha/idp"
1498
+ }
1499
+ ],
1500
+ "singleSignOnService": [
1501
+ {
1502
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1503
+ "location": "https://openam-admin-fed.forgeblocks.com/am/SSOPOST/metaAlias/alpha/idp"
1504
+ },
1505
+ {
1506
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1507
+ "location": "https://openam-admin-fed.forgeblocks.com/am/SSORedirect/metaAlias/alpha/idp"
1508
+ },
1509
+ {
1510
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1511
+ "location": "https://openam-admin-fed.forgeblocks.com/am/SSOSoap/metaAlias/alpha/idp"
1512
+ }
1513
+ ]
1514
+ },
1515
+ "nameIdMapping": [
1516
+ {
1517
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1518
+ "location": "https://openam-admin-fed.forgeblocks.com/am/NIMSoap/metaAlias/alpha/idp"
1519
+ }
1520
+ ]
1521
+ }
1522
+ }
1523
+ },
1524
+ "dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l": {
1525
+ "_id": "dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l",
1526
+ "_rev": "1971501705",
1527
+ "entityId": "urn:federation:MicrosoftOnline",
1528
+ "serviceProvider": {
1529
+ "assertionContent": {
1530
+ "signingAndEncryption": {
1531
+ "requestResponseSigning": {
1532
+ "assertion": true
1533
+ },
1534
+ "encryption": {}
1535
+ },
1536
+ "nameIdFormat": {
1537
+ "nameIdFormatList": [
1538
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
1539
+ "urn:mace:shibboleth:1.0:nameIdentifier",
1540
+ "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",
1541
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
1542
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent"
1543
+ ]
1544
+ },
1545
+ "basicAuthentication": {}
1546
+ },
1547
+ "assertionProcessing": {
1548
+ "attributeMapper": {
1549
+ "attributeMap": [
1550
+ {
1551
+ "samlAttribute": "IDPEmail",
1552
+ "localAttribute": "mail",
1553
+ "binary": false
1554
+ },
1555
+ {
1556
+ "samlAttribute": "UOPClassID",
1557
+ "localAttribute": "UOPClassID",
1558
+ "binary": false
1559
+ }
1560
+ ]
1561
+ },
1562
+ "responseArtifactMessageEncoding": {
1563
+ "encoding": "URI"
1564
+ }
1565
+ },
1566
+ "services": {
1567
+ "serviceAttributes": {
1568
+ "singleLogoutService": [
1569
+ {
1570
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1571
+ "location": "https://login.microsoftonline.com/login.srf"
1572
+ }
1573
+ ],
1574
+ "assertionConsumerService": [
1575
+ {
1576
+ "isDefault": true,
1577
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1578
+ "location": "https://login.microsoftonline.com/login.srf",
1579
+ "index": 0
1580
+ },
1581
+ {
1582
+ "isDefault": false,
1583
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign",
1584
+ "location": "https://login.microsoftonline.com/login.srf",
1585
+ "index": 1
1586
+ },
1587
+ {
1588
+ "isDefault": false,
1589
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:PAOS",
1590
+ "location": "https://login.microsoftonline.com/login.srf",
1591
+ "index": 2
1592
+ }
1593
+ ]
1594
+ }
1595
+ },
1596
+ "advanced": {
1597
+ "saeConfiguration": {},
1598
+ "idpProxy": {}
1599
+ }
1600
+ }
1601
+ },
1602
+ "aHR0cHM6Ly9zYW1sLm15dGVzdHJ1bi5jb20vc3A": {
1603
+ "_id": "aHR0cHM6Ly9zYW1sLm15dGVzdHJ1bi5jb20vc3A",
1604
+ "_rev": "278033832",
1605
+ "entityId": "https://saml.mytestrun.com/sp",
1606
+ "serviceProvider": {
1607
+ "assertionContent": {
1608
+ "signingAndEncryption": {
1609
+ "requestResponseSigning": {
1610
+ "authenticationRequest": false,
1611
+ "assertion": false
1612
+ },
1613
+ "encryption": {}
1614
+ },
1615
+ "nameIdFormat": {
1616
+ "nameIdFormatList": [
1617
+ "urn:oasis:names:tc:SAML:2.0:nameid-format:transient"
1618
+ ]
1619
+ },
1620
+ "basicAuthentication": {
1621
+ "enabled": false
1622
+ }
1623
+ },
1624
+ "assertionProcessing": {
1625
+ "attributeMapper": {},
1626
+ "responseArtifactMessageEncoding": {}
1627
+ },
1628
+ "services": {
1629
+ "serviceAttributes": {
1630
+ "singleLogoutService": [
1631
+ {
1632
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",
1633
+ "location": "https://saml.mytestrun.com:443/sp/fedletSloRedirect",
1634
+ "responseLocation": "https://saml.mytestrun.com:443/sp/fedletSloRedirect"
1635
+ },
1636
+ {
1637
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1638
+ "location": "https://saml.mytestrun.com:443/sp/fedletSloPOST",
1639
+ "responseLocation": "https://saml.mytestrun.com:443/sp/fedletSloPOST"
1640
+ },
1641
+ {
1642
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP",
1643
+ "location": "https://saml.mytestrun.com:443/sp/fedletSloSoap"
1644
+ }
1645
+ ],
1646
+ "assertionConsumerService": [
1647
+ {
1648
+ "isDefault": true,
1649
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST",
1650
+ "location": "https://saml.mytestrun.com:443/sp/fedletapplication",
1651
+ "index": 0
1652
+ },
1653
+ {
1654
+ "isDefault": false,
1655
+ "binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact",
1656
+ "location": "https://saml.mytestrun.com:443/sp/fedletapplication",
1657
+ "index": 1
1658
+ }
1659
+ ]
1660
+ }
1661
+ },
1662
+ "advanced": {
1663
+ "saeConfiguration": {},
1664
+ "idpProxy": {}
1665
+ }
1666
+ }
1667
+ }
1668
+ },
1669
+ "metadata": {
1670
+ "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQXp1cmU": [
1671
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
1672
+ "<EntityDescriptor entityID=\"https://idc.scheuber.io/am/saml2/IDPAzure\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
1673
+ " <IDPSSODescriptor WantAuthnRequestsSigned=\"false\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
1674
+ " <KeyDescriptor use=\"signing\">",
1675
+ " <ds:KeyInfo>",
1676
+ " <ds:X509Data>",
1677
+ " <ds:X509Certificate>",
1678
+ "MIIDXzCCAkegAwIBAgIEXw0sqjANBgkqhkiG9w0BAQsFADBgMQswCQYDVQQGEwJVSzEQMA4GA1UE",
1679
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMRkwFwYDVQQD",
1680
+ "ExByc2Fqd3RzaWduaW5na2V5MB4XDTIxMDMwNjAyMTgzNVoXDTMxMDMwNDAyMTgzNVowYDELMAkG",
1681
+ "A1UEBhMCVUsxEDAOBgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZv",
1682
+ "cmdlUm9jazEZMBcGA1UEAxMQcnNhand0c2lnbmluZ2tleTCCASIwDQYJKoZIhvcNAQEBBQADggEP",
1683
+ "ADCCAQoCggEBAI7DfQgOfXacEXp9EUBbH4PosMK36VIeZDO/gllKmJYnOsa+7FPHMJi7OETsF7sF",
1684
+ "FkiL63+3KiqBIk1b9cIp6SWnp7Z2Hvz+WwgF6o0ZhRWbpF1FyLHZWKB2H30BdY6I3keE2xnvOsmq",
1685
+ "X9pyTdap52WatS06GMAzpisMEZsremV49vc5zuVS//QWSmv6r0S9UNfgW1iICKfqxeYibAND2kgc",
1686
+ "2+0I9QTabH59601aGm2bgTr+EOVtbQUEvblz7/l6b4Q4y8o+BmwXk+olPKgBruPa0XOXBpCa7b/d",
1687
+ "SfLI7z2XHyMzqNG9IGg0LWMtlj7WC0V2gJIrvoxBkSApDUWxyOkCAwEAAaMhMB8wHQYDVR0OBBYE",
1688
+ "FMfL4Owt4dhAwUApAiUclxOHGeUcMA0GCSqGSIb3DQEBCwUAA4IBAQA3xUrvKeQcTMaywcrv8KPP",
1689
+ "WWz5ybb5TxW/5T/W7BtOwFqgEIPQcnauBQ6Pv2tEGWW83lPTan6+boDTTtzASKn9oO0P+dqIH6iw",
1690
+ "ARGw/beScRk3xYpnhUsuMb/RDU5IhQYksD/95Ep9Kx3bDMFjFw7ShE0teHq/GAbymUj5vJQfEKZl",
1691
+ "9G+UByYkvoSoFFjQKK+T2JUVpmernGqVkDZ35oRSktgz0xesZkiKkc0iczAmgBY2w95bxrK4rfA5",
1692
+ "S6PFTRF06pZG55r+bcQAhZXEMzbchHh7WaxqEev97s7JlqyLl3VoIC7UBJcCasJLNeGE551r0R0/",
1693
+ "noRTsMSbQ3Eex5Kt",
1694
+ " </ds:X509Certificate>",
1695
+ " </ds:X509Data>",
1696
+ " </ds:KeyInfo>",
1697
+ " </KeyDescriptor>",
1698
+ " <KeyDescriptor use=\"encryption\">",
1699
+ " <ds:KeyInfo>",
1700
+ " <ds:X509Data>",
1701
+ " <ds:X509Certificate>",
1702
+ "MIIDRzCCAi+gAwIBAgIEHYaG7jANBgkqhkiG9w0BAQsFADBUMQswCQYDVQQGEwJVSzEQMA4GA1UE",
1703
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMQ0wCwYDVQQD",
1704
+ "EwR0ZXN0MB4XDTIxMDMwNjAyMTgzNloXDTMxMDMwNDAyMTgzNlowVDELMAkGA1UEBhMCVUsxEDAO",
1705
+ "BgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZvcmdlUm9jazENMAsG",
1706
+ "A1UEAxMEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJXDj9VJdnw0X/g2NS8A",
1707
+ "4AEJp5OmaspGrrFkDyZll+niAPNHfE74v9UB1fvH5SJTRiq81HS3sVSwMjjThstkZ81AeMFQeGaB",
1708
+ "Y16Dilkvi2vhIqoxSTjTs11lo5hSfMPOSPmRbH3jJ3Ta1FyywLKWsfM8lmhw+H17/jrViZxghPVt",
1709
+ "KqIaTz+VainC45bgxnZZ/eJSfyPoYTHf+AQRMKEeAxolvOOhwk6xoo3eRMLPhJm1LnwsfYJxJTbE",
1710
+ "aPwlYHkzmG3VF/X3dCRuXvgjA+whD/e0qSfjrUe1r5X/x0NSygE716IKip3iBuNxZR4s8NrF+N6V",
1711
+ "H44aZEE6nxdqh5BOPU0CAwEAAaMhMB8wHQYDVR0OBBYEFPY8mXz+eNBNDNOfShi1X3RNHXqUMA0G",
1712
+ "CSqGSIb3DQEBCwUAA4IBAQBK9OIz9XW+PX8A29PKSUgRJbDPqIWyCilnKyV00Rpxe40KhQqUV8ur",
1713
+ "PioiVxz+YIgf+6VtNhF6ClUX4pDOT48QxnSqX5Qy3Xm/+Sfsm6Sa4EPkLaZYspqoySAHv9FcdLWJ",
1714
+ "u7VvWbDw9oDWG2fZCatNXFzhLWC2EI+vF5tmKDatJLbRHGqQ1jQQpVlYsHcCvaJUThO+jA8X8Yq6",
1715
+ "UqYxD2Z+RV/WboIBbx21sS1HQTeR3tUhz4y4+FYr2c4o2VPrrzQ2NmUN/I5iMxWIGOgHm5/2ZAhl",
1716
+ "J/Ap7YiDLr8eMtidvAdXmN9Sg7iTNVi6ylhqanZh56MKWXDKD2BxLXiQgJge",
1717
+ " </ds:X509Certificate>",
1718
+ " </ds:X509Data>",
1719
+ " </ds:KeyInfo>",
1720
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\">",
1721
+ " <ds:DigestMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#sha256\"/>",
1722
+ " </EncryptionMethod>",
1723
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\">",
1724
+ " <xenc:KeySize>128</xenc:KeySize>",
1725
+ " </EncryptionMethod>",
1726
+ " </KeyDescriptor>",
1727
+ " <ArtifactResolutionService index=\"0\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/ArtifactResolver/metaAlias/alpha/IDPAzure\"/>",
1728
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPAzure\"/>",
1729
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPAzure\"/>",
1730
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/IDPSloSoap/metaAlias/alpha/IDPAzure\"/>",
1731
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPAzure\"/>",
1732
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPAzure\"/>",
1733
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/IDPMniSoap/metaAlias/alpha/IDPAzure\"/>",
1734
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>",
1735
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>",
1736
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>",
1737
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>",
1738
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName</NameIDFormat>",
1739
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos</NameIDFormat>",
1740
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName</NameIDFormat>",
1741
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/SSORedirect/metaAlias/alpha/IDPAzure\"/>",
1742
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/SSOPOST/metaAlias/alpha/IDPAzure\"/>",
1743
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/SSOSoap/metaAlias/alpha/IDPAzure\"/>",
1744
+ " <NameIDMappingService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/NIMSoap/metaAlias/alpha/IDPAzure\"/>",
1745
+ " <AssertionIDRequestService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/AIDReqSoap/IDPRole/metaAlias/alpha/IDPAzure\"/>",
1746
+ " <AssertionIDRequestService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:URI\" Location=\"https://idc.scheuber.io/am/AIDReqUri/IDPRole/metaAlias/alpha/IDPAzure\"/>",
1747
+ " </IDPSSODescriptor>",
1748
+ "</EntityDescriptor>",
1749
+ "",
1750
+ ""
1751
+ ],
1752
+ "U1BBenVyZQ": [
1753
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
1754
+ "<EntityDescriptor entityID=\"SPAzure\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
1755
+ " <SPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
1756
+ " <KeyDescriptor use=\"signing\">",
1757
+ " <ds:KeyInfo>",
1758
+ " <ds:X509Data>",
1759
+ " <ds:X509Certificate>",
1760
+ "MIIDXzCCAkegAwIBAgIEXw0sqjANBgkqhkiG9w0BAQsFADBgMQswCQYDVQQGEwJVSzEQMA4GA1UE",
1761
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMRkwFwYDVQQD",
1762
+ "ExByc2Fqd3RzaWduaW5na2V5MB4XDTIxMDMwNjAyMTgzNVoXDTMxMDMwNDAyMTgzNVowYDELMAkG",
1763
+ "A1UEBhMCVUsxEDAOBgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZv",
1764
+ "cmdlUm9jazEZMBcGA1UEAxMQcnNhand0c2lnbmluZ2tleTCCASIwDQYJKoZIhvcNAQEBBQADggEP",
1765
+ "ADCCAQoCggEBAI7DfQgOfXacEXp9EUBbH4PosMK36VIeZDO/gllKmJYnOsa+7FPHMJi7OETsF7sF",
1766
+ "FkiL63+3KiqBIk1b9cIp6SWnp7Z2Hvz+WwgF6o0ZhRWbpF1FyLHZWKB2H30BdY6I3keE2xnvOsmq",
1767
+ "X9pyTdap52WatS06GMAzpisMEZsremV49vc5zuVS//QWSmv6r0S9UNfgW1iICKfqxeYibAND2kgc",
1768
+ "2+0I9QTabH59601aGm2bgTr+EOVtbQUEvblz7/l6b4Q4y8o+BmwXk+olPKgBruPa0XOXBpCa7b/d",
1769
+ "SfLI7z2XHyMzqNG9IGg0LWMtlj7WC0V2gJIrvoxBkSApDUWxyOkCAwEAAaMhMB8wHQYDVR0OBBYE",
1770
+ "FMfL4Owt4dhAwUApAiUclxOHGeUcMA0GCSqGSIb3DQEBCwUAA4IBAQA3xUrvKeQcTMaywcrv8KPP",
1771
+ "WWz5ybb5TxW/5T/W7BtOwFqgEIPQcnauBQ6Pv2tEGWW83lPTan6+boDTTtzASKn9oO0P+dqIH6iw",
1772
+ "ARGw/beScRk3xYpnhUsuMb/RDU5IhQYksD/95Ep9Kx3bDMFjFw7ShE0teHq/GAbymUj5vJQfEKZl",
1773
+ "9G+UByYkvoSoFFjQKK+T2JUVpmernGqVkDZ35oRSktgz0xesZkiKkc0iczAmgBY2w95bxrK4rfA5",
1774
+ "S6PFTRF06pZG55r+bcQAhZXEMzbchHh7WaxqEev97s7JlqyLl3VoIC7UBJcCasJLNeGE551r0R0/",
1775
+ "noRTsMSbQ3Eex5Kt",
1776
+ " </ds:X509Certificate>",
1777
+ " </ds:X509Data>",
1778
+ " </ds:KeyInfo>",
1779
+ " </KeyDescriptor>",
1780
+ " <KeyDescriptor use=\"encryption\">",
1781
+ " <ds:KeyInfo>",
1782
+ " <ds:X509Data>",
1783
+ " <ds:X509Certificate>",
1784
+ "MIIDRzCCAi+gAwIBAgIEHYaG7jANBgkqhkiG9w0BAQsFADBUMQswCQYDVQQGEwJVSzEQMA4GA1UE",
1785
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMQ0wCwYDVQQD",
1786
+ "EwR0ZXN0MB4XDTIxMDMwNjAyMTgzNloXDTMxMDMwNDAyMTgzNlowVDELMAkGA1UEBhMCVUsxEDAO",
1787
+ "BgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZvcmdlUm9jazENMAsG",
1788
+ "A1UEAxMEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJXDj9VJdnw0X/g2NS8A",
1789
+ "4AEJp5OmaspGrrFkDyZll+niAPNHfE74v9UB1fvH5SJTRiq81HS3sVSwMjjThstkZ81AeMFQeGaB",
1790
+ "Y16Dilkvi2vhIqoxSTjTs11lo5hSfMPOSPmRbH3jJ3Ta1FyywLKWsfM8lmhw+H17/jrViZxghPVt",
1791
+ "KqIaTz+VainC45bgxnZZ/eJSfyPoYTHf+AQRMKEeAxolvOOhwk6xoo3eRMLPhJm1LnwsfYJxJTbE",
1792
+ "aPwlYHkzmG3VF/X3dCRuXvgjA+whD/e0qSfjrUe1r5X/x0NSygE716IKip3iBuNxZR4s8NrF+N6V",
1793
+ "H44aZEE6nxdqh5BOPU0CAwEAAaMhMB8wHQYDVR0OBBYEFPY8mXz+eNBNDNOfShi1X3RNHXqUMA0G",
1794
+ "CSqGSIb3DQEBCwUAA4IBAQBK9OIz9XW+PX8A29PKSUgRJbDPqIWyCilnKyV00Rpxe40KhQqUV8ur",
1795
+ "PioiVxz+YIgf+6VtNhF6ClUX4pDOT48QxnSqX5Qy3Xm/+Sfsm6Sa4EPkLaZYspqoySAHv9FcdLWJ",
1796
+ "u7VvWbDw9oDWG2fZCatNXFzhLWC2EI+vF5tmKDatJLbRHGqQ1jQQpVlYsHcCvaJUThO+jA8X8Yq6",
1797
+ "UqYxD2Z+RV/WboIBbx21sS1HQTeR3tUhz4y4+FYr2c4o2VPrrzQ2NmUN/I5iMxWIGOgHm5/2ZAhl",
1798
+ "J/Ap7YiDLr8eMtidvAdXmN9Sg7iTNVi6ylhqanZh56MKWXDKD2BxLXiQgJge",
1799
+ " </ds:X509Certificate>",
1800
+ " </ds:X509Data>",
1801
+ " </ds:KeyInfo>",
1802
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\">",
1803
+ " <ds:DigestMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#sha256\"/>",
1804
+ " </EncryptionMethod>",
1805
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\">",
1806
+ " <xenc:KeySize>128</xenc:KeySize>",
1807
+ " </EncryptionMethod>",
1808
+ " </KeyDescriptor>",
1809
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/SPSloRedirect/metaAlias/alpha/SPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/SPSloRedirect/metaAlias/alpha/SPAzure\"/>",
1810
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/SPSloPOST/metaAlias/alpha/SPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/SPSloPOST/metaAlias/alpha/SPAzure\"/>",
1811
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/SPSloSoap/metaAlias/alpha/SPAzure\"/>",
1812
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/SPMniRedirect/metaAlias/alpha/SPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/SPMniRedirect/metaAlias/alpha/SPAzure\"/>",
1813
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/SPMniPOST/metaAlias/alpha/SPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/SPMniPOST/metaAlias/alpha/SPAzure\"/>",
1814
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/SPMniSoap/metaAlias/alpha/SPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/SPMniSoap/metaAlias/alpha/SPAzure\"/>",
1815
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>",
1816
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>",
1817
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>",
1818
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>",
1819
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName</NameIDFormat>",
1820
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos</NameIDFormat>",
1821
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName</NameIDFormat>",
1822
+ " <AssertionConsumerService index=\"0\" isDefault=\"true\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact\" Location=\"https://idc.scheuber.io/am/Consumer/metaAlias/alpha/SPAzure\"/>",
1823
+ " <AssertionConsumerService index=\"1\" isDefault=\"false\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/Consumer/metaAlias/alpha/SPAzure\"/>",
1824
+ " <AssertionConsumerService index=\"2\" isDefault=\"false\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:PAOS\" Location=\"https://idc.scheuber.io/am/Consumer/ECP/metaAlias/alpha/SPAzure\"/>",
1825
+ " </SPSSODescriptor>",
1826
+ "</EntityDescriptor>",
1827
+ "",
1828
+ ""
1829
+ ],
1830
+ "aHR0cHM6Ly9zdHMud2luZG93cy5uZXQvNzExZmZhOWMtNTk3Mi00NzEzLWFjZTMtNjg4Yzk3MzI2MTRhLw": [
1831
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
1832
+ "<EntityDescriptor entityID=\"https://sts.windows.net/711ffa9c-5972-4713-ace3-688c9732614a/\" ID=\"_e5f839b8-1482-40ae-9261-b6eb35465a16\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
1833
+ " <IDPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
1834
+ " <KeyDescriptor use=\"signing\">",
1835
+ " <ds:KeyInfo>",
1836
+ " ",
1837
+ " ",
1838
+ " <ds:X509Data>",
1839
+ " <ds:X509Certificate>",
1840
+ "MIIC8DCCAdigAwIBAgIQZzae6CymcZhG5gxIgB7mMDANBgkqhkiG9w0BAQsFADA0MTIwMAYDVQQD",
1841
+ "EylNaWNyb3NvZnQgQXp1cmUgRmVkZXJhdGVkIFNTTyBDZXJ0aWZpY2F0ZTAeFw0yMTAzMzEyMDI0",
1842
+ "MTdaFw0yNDAzMzEyMDI0MTdaMDQxMjAwBgNVBAMTKU1pY3Jvc29mdCBBenVyZSBGZWRlcmF0ZWQg",
1843
+ "U1NPIENlcnRpZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv62V9U2Wi8gr",
1844
+ "arSBp7s4Bupke9vaXsNOgNZ8Vn/i0mo6Jn0E1HmJ6uIy+QeahQDtxFQyoEW1LeLGBeVwvUvOfSwf",
1845
+ "wPBEHLw9g3F84IdgfIWtezj87BHh3ezwb0r/0Eny3xHcS02wQsIFRIhn7ltCaMFrTja18gBapuRl",
1846
+ "36Ujfod7W1uL1HJTsw8auKXYEhutbeQYpdU6qcPaksJd1r16q+Jc78MHptKMWSNI1OnB9jK8hr/3",
1847
+ "aug+LSeuJScaJQZDo/qKDmoIC6KT6CgfzUy33I/gjU6RjVcwNw4XFpk5ad13HXTtfCLtPtMxGYuk",
1848
+ "cOxX3M80EJMLFr2sJO0vJbA8aQIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQB8GmsA4N5KDQ79v+/1",
1849
+ "zVFq8domQYZm8wEAIHn4+T02IluDa9Ty/EqgFzvqAZUILQneFrGCh9uIub/Z3NtkIgs2gbAduxdn",
1850
+ "hzdwhNRNivks4P0CO+9Q1iK/xOsmWo12xsyB4lyAv7HsF+COIPFGhRfzsCxVFKfU8x2r+bb8kWLM",
1851
+ "YpA2NDlz+MTXQEWhFtCLwQRjHlD6C5+yzqoAFBO7RR28mztTF0nVbKj7N+Ri5VLEKJospkwUDtIH",
1852
+ "dcp2bSVwhziAIn05yiw6AVIZnje7cN+kJdCIDgqQ+Ebb96C/Y0JmYvz6sJVP0/u5oR5PrsQqBrw4",
1853
+ "OzVWNFaXuTcN3UicN01V",
1854
+ " </ds:X509Certificate>",
1855
+ " </ds:X509Data>",
1856
+ " </ds:KeyInfo>",
1857
+ " </KeyDescriptor>",
1858
+ " <KeyDescriptor use=\"signing\">",
1859
+ " <ds:KeyInfo>",
1860
+ " ",
1861
+ " ",
1862
+ " <ds:X509Data>",
1863
+ " <ds:X509Certificate>",
1864
+ "MIIC8DCCAdigAwIBAgIQfU4A0Hnj17dI0GSzvUwMZTANBgkqhkiG9w0BAQsFADA0MTIwMAYDVQQD",
1865
+ "EylNaWNyb3NvZnQgQXp1cmUgRmVkZXJhdGVkIFNTTyBDZXJ0aWZpY2F0ZTAeFw0yMTA2MDYwMTQy",
1866
+ "MzBaFw0yNDA2MDYwMTQyMzBaMDQxMjAwBgNVBAMTKU1pY3Jvc29mdCBBenVyZSBGZWRlcmF0ZWQg",
1867
+ "U1NPIENlcnRpZmljYXRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAm+fFmS+eVDho",
1868
+ "FhlYoY1vRkJIblLct3ZT/sT5AmIoCEGxXBeiSCwnSCveXEfrqEHmjlT5qni5spO+OmX7GrLeytHk",
1869
+ "hl3O6XiXyVBlvyTSFd/bLHR2DqdxbUxUs2E7WfwQyq9Ob9i3++4fRIPFw+JcZ99ouZasHn2BJvWh",
1870
+ "liT7yRtYhvwboc8BwWveL70ZJqsCJnlOKQVIccCdNbQe6HleePXgFB4pRge46zmqKVeEpLbBRqgj",
1871
+ "Yf7EkhBJjx0WY2zMW7DLHDCZEY6VS2Kf9gJpGntNSLe0gXydBFtaFPgyaKIVswZ5hY1oRDPHEXEJ",
1872
+ "+a5TVRGLeTlyK0v9Y+c8d3XdoQIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQBZ5lcYpe13quossxB7",
1873
+ "L2Y1E7hpy7AZgWr/OGYi/tUh1pJ4++3uZvHJLtTfXc7V+Y5EG6LRq9HZyF0hSvubhYkDXlwYbF7U",
1874
+ "/osQjTe1tffPWO3bwzcrBVz7ytvb7DyvikI3C0f3LaCgEwxwYCD33IowNQS/IJA7W/kiFb/7q/Qu",
1875
+ "7T/gDL1RjYdm9WmYW3RNn0Kh1VDBiCfY739xpCwdH11OUQfVc+9Z2KSSQY7EAlVgwpq+UiVdOqY9",
1876
+ "m4cqul7uvjiSTgG0h5RW9xi3a6Lilk1TxsQUu4tRnGsDCAFgkgLN5rNnlQULuahzruoXWqe4g6pn",
1877
+ "Ritpy6bwva8piGPKhVi/",
1878
+ " </ds:X509Certificate>",
1879
+ " </ds:X509Data>",
1880
+ " </ds:KeyInfo>",
1881
+ " </KeyDescriptor>",
1882
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://login.microsoftonline.com/711ffa9c-5972-4713-ace3-688c9732614a/saml2\"/>",
1883
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://login.microsoftonline.com/711ffa9c-5972-4713-ace3-688c9732614a/saml2\"/>",
1884
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://login.microsoftonline.com/711ffa9c-5972-4713-ace3-688c9732614a/saml2\"/>",
1885
+ " </IDPSSODescriptor>",
1886
+ "</EntityDescriptor>",
1887
+ "",
1888
+ ""
1889
+ ],
1890
+ "aWRw": [
1891
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
1892
+ "<EntityDescriptor entityID=\"idp\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
1893
+ " <IDPSSODescriptor WantAuthnRequestsSigned=\"false\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
1894
+ " <KeyDescriptor use=\"signing\">",
1895
+ " <ds:KeyInfo>",
1896
+ " ",
1897
+ " ",
1898
+ " <ds:X509Data>",
1899
+ " <ds:X509Certificate>",
1900
+ "MIIDXzCCAkegAwIBAgIEAxJ36DANBgkqhkiG9w0BAQsFADBgMQswCQYDVQQGEwJVSzEQMA4GA1UE",
1901
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMRkwFwYDVQQD",
1902
+ "ExByc2Fqd3RzaWduaW5na2V5MB4XDTIyMDcwODIyNDAyMloXDTMyMDcwNTIyNDAyMlowYDELMAkG",
1903
+ "A1UEBhMCVUsxEDAOBgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZv",
1904
+ "cmdlUm9jazEZMBcGA1UEAxMQcnNhand0c2lnbmluZ2tleTCCASIwDQYJKoZIhvcNAQEBBQADggEP",
1905
+ "ADCCAQoCggEBAKSsGxtvBW0YxWTZ+lWGoSAOMgFI6dkUIZ+6NJ7SWp5nO5bOBVAd6/c9xZvhSXkF",
1906
+ "Gz3iL0EI9WLaIf6xKsHlxUz0exFE0jzb7EMDyYD/kHNDBM5a+rMEo+f/YjP5ADjkzNy6Zt9Ll0Uq",
1907
+ "yO+LHLcXARE0ts2/2XckmZdSwkXuQdN1yN4lFif5Kj3cuqRHsqfwchxuKiV9BQHq8Jx1ACYcpbkV",
1908
+ "VkDvC6awk61He9CgwJHbNKTdqU3sKGiZWz8Mz7TAvM2I/LLfsdSZXXLnA7C5EOPVVJ/RLs7sJuVm",
1909
+ "M0KUQOjf3TNJAjBULVDaCtmcANMnZCvXyuI4EvfuW/iuqGCqG9ECAwEAAaMhMB8wHQYDVR0OBBYE",
1910
+ "FAxLR/y+kv5fcM3bLHczhhKgPjABMA0GCSqGSIb3DQEBCwUAA4IBAQAHCEpuu9ThpTOLoJPnzQts",
1911
+ "UK6G7REJh8w1doL4qTeq9oylnWeidvSLNhuowXZS0LyA5YXEm6tyv2NiHDv3DtoP8kBsCOLPVGhE",
1912
+ "yoQy01XZYnngGzzqwFDnKJgiV3hNwqM/bGhW19N0AiVLc46iidTJ4+ekTwLxdcgwOob3+JNnio10",
1913
+ "XH+f2ncH09Lkqv+7dnUGo/NjMHCcEWJ/2PB/gjbGKAi+m43mRgJz2+BeOOEzeSsDe/n9LYl7/drO",
1914
+ "Tf0T+k7dwlE+p0vLID6I+tDI18Bdl2TUUaFCT/D71LvE6qZhrwETJ60+IMyaFWBmZte4VQjhv8f+",
1915
+ "EdVaivDEwSH2Enxz",
1916
+ " </ds:X509Certificate>",
1917
+ " </ds:X509Data>",
1918
+ " </ds:KeyInfo>",
1919
+ " </KeyDescriptor>",
1920
+ " <KeyDescriptor use=\"encryption\">",
1921
+ " <ds:KeyInfo>",
1922
+ " ",
1923
+ " ",
1924
+ " <ds:X509Data>",
1925
+ " <ds:X509Certificate>",
1926
+ "MIIDRzCCAi+gAwIBAgIEB86zjDANBgkqhkiG9w0BAQsFADBUMQswCQYDVQQGEwJVSzEQMA4GA1UE",
1927
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMQ0wCwYDVQQD",
1928
+ "EwR0ZXN0MB4XDTIyMDcwODIyNDAyM1oXDTMyMDcwNTIyNDAyM1owVDELMAkGA1UEBhMCVUsxEDAO",
1929
+ "BgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZvcmdlUm9jazENMAsG",
1930
+ "A1UEAxMEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIWctGA/i844aSlLy6Sv",
1931
+ "g/cHAinfbSlZKSXVzcbFivYC6g9RAUd5L9hrXlT302CAq+prMavGPqPj25g02ADGelVb6XB3CSi4",
1932
+ "zN6CxXgWlNXj1NrMrANvpHwPH6n5UYOTUFCOoi4shzIwwQlNHFr5sTxOqEvZNwKSxe45YvhizwwW",
1933
+ "S6TPwPNlBP1nfXApI6xz7xzti9m0nAMaeqmGCjWFz9O3Zec46ep5nS/ffKDYKPBo7SRDyqDg3p7g",
1934
+ "pAKt0+4XEUiCHALb9qmnhzFWE6r5DkiKDksOHxnMj6vjJ5AvEpyV1gwDKu7cf39+rgldGd5VWEve",
1935
+ "J1Xy+A3mFdW+ZOOviB8CAwEAAaMhMB8wHQYDVR0OBBYEFOubn2CikmtO19J8/41QvHuSGnFEMA0G",
1936
+ "CSqGSIb3DQEBCwUAA4IBAQCAIIxDwqJqIIL1yBdip/wTPofVkwG533a9QyPoFTDRmjdA2oH2Tf6L",
1937
+ "ebsc8DiGocifXLJ3e3dpREWO8dFtdGfwFr0iAeu9rpi15OY62mbjOtEHXnuoesPvaNe0jPOOEcAM",
1938
+ "dxRjo1E5ZuZPeTzH/trrBEzZ/hhlqPH326cqx5Id4XDj5WpVGPystWbUCS7v1flZHLCMCGjjFxuq",
1939
+ "2cthH1+oRbcZ2UABuPn9twbdC3tPhIYiwrcr4bN9+ATfJAeMgYlW13tLaKjFoBuqqxHjGpdKJFLM",
1940
+ "6ci4o71BahFS/8a3lWrFURXjtkoKZ8DZlMgK9GD8wk6O/2YGbihuYQobk2cD",
1941
+ " </ds:X509Certificate>",
1942
+ " </ds:X509Data>",
1943
+ " </ds:KeyInfo>",
1944
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\">",
1945
+ " ",
1946
+ " ",
1947
+ " <ds:DigestMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#sha256\"/>",
1948
+ " </EncryptionMethod>",
1949
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\">",
1950
+ " ",
1951
+ " ",
1952
+ " <xenc:KeySize>128</xenc:KeySize>",
1953
+ " </EncryptionMethod>",
1954
+ " </KeyDescriptor>",
1955
+ " <ArtifactResolutionService index=\"0\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://openam-admin-fed.forgeblocks.com/am/ArtifactResolver/metaAlias/alpha/idp\"/>",
1956
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://openam-admin-fed.forgeblocks.com/am/IDPSloRedirect/metaAlias/alpha/idp\" ResponseLocation=\"https://openam-admin-fed.forgeblocks.com/am/IDPSloRedirect/metaAlias/alpha/idp\"/>",
1957
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://openam-admin-fed.forgeblocks.com/am/IDPSloPOST/metaAlias/alpha/idp\" ResponseLocation=\"https://openam-admin-fed.forgeblocks.com/am/IDPSloPOST/metaAlias/alpha/idp\"/>",
1958
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://openam-admin-fed.forgeblocks.com/am/IDPSloSoap/metaAlias/alpha/idp\"/>",
1959
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://openam-admin-fed.forgeblocks.com/am/IDPMniPOST/metaAlias/alpha/idp\" ResponseLocation=\"https://openam-admin-fed.forgeblocks.com/am/IDPMniPOST/metaAlias/alpha/idp\"/>",
1960
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://openam-admin-fed.forgeblocks.com/am/IDPMniRedirect/metaAlias/alpha/idp\" ResponseLocation=\"https://openam-admin-fed.forgeblocks.com/am/IDPMniRedirect/metaAlias/alpha/idp\"/>",
1961
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://openam-admin-fed.forgeblocks.com/am/IDPMniSoap/metaAlias/alpha/idp\"/>",
1962
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>",
1963
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://openam-admin-fed.forgeblocks.com/am/SSOPOST/metaAlias/alpha/idp\"/>",
1964
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://openam-admin-fed.forgeblocks.com/am/SSORedirect/metaAlias/alpha/idp\"/>",
1965
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://openam-admin-fed.forgeblocks.com/am/SSOSoap/metaAlias/alpha/idp\"/>",
1966
+ " <NameIDMappingService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://openam-admin-fed.forgeblocks.com/am/NIMSoap/metaAlias/alpha/idp\"/>",
1967
+ " <AssertionIDRequestService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://openam-admin-fed.forgeblocks.com/am/AIDReqSoap/IDPRole/metaAlias/alpha/idp\"/>",
1968
+ " <AssertionIDRequestService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:URI\" Location=\"https://openam-admin-fed.forgeblocks.com/am/AIDReqUri/IDPRole/metaAlias/alpha/idp\"/>",
1969
+ " </IDPSSODescriptor>",
1970
+ "</EntityDescriptor>",
1971
+ "",
1972
+ ""
1973
+ ],
1974
+ "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQRmVkbGV0": [
1975
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
1976
+ "<EntityDescriptor entityID=\"https://idc.scheuber.io/am/saml2/IDPFedlet\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
1977
+ " <IDPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
1978
+ " <KeyDescriptor use=\"signing\">",
1979
+ " <ds:KeyInfo>",
1980
+ " <ds:X509Data>",
1981
+ " <ds:X509Certificate>",
1982
+ "MIIDXzCCAkegAwIBAgIEXw0sqjANBgkqhkiG9w0BAQsFADBgMQswCQYDVQQGEwJVSzEQMA4GA1UE",
1983
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMRkwFwYDVQQD",
1984
+ "ExByc2Fqd3RzaWduaW5na2V5MB4XDTIxMDMwNjAyMTgzNVoXDTMxMDMwNDAyMTgzNVowYDELMAkG",
1985
+ "A1UEBhMCVUsxEDAOBgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZv",
1986
+ "cmdlUm9jazEZMBcGA1UEAxMQcnNhand0c2lnbmluZ2tleTCCASIwDQYJKoZIhvcNAQEBBQADggEP",
1987
+ "ADCCAQoCggEBAI7DfQgOfXacEXp9EUBbH4PosMK36VIeZDO/gllKmJYnOsa+7FPHMJi7OETsF7sF",
1988
+ "FkiL63+3KiqBIk1b9cIp6SWnp7Z2Hvz+WwgF6o0ZhRWbpF1FyLHZWKB2H30BdY6I3keE2xnvOsmq",
1989
+ "X9pyTdap52WatS06GMAzpisMEZsremV49vc5zuVS//QWSmv6r0S9UNfgW1iICKfqxeYibAND2kgc",
1990
+ "2+0I9QTabH59601aGm2bgTr+EOVtbQUEvblz7/l6b4Q4y8o+BmwXk+olPKgBruPa0XOXBpCa7b/d",
1991
+ "SfLI7z2XHyMzqNG9IGg0LWMtlj7WC0V2gJIrvoxBkSApDUWxyOkCAwEAAaMhMB8wHQYDVR0OBBYE",
1992
+ "FMfL4Owt4dhAwUApAiUclxOHGeUcMA0GCSqGSIb3DQEBCwUAA4IBAQA3xUrvKeQcTMaywcrv8KPP",
1993
+ "WWz5ybb5TxW/5T/W7BtOwFqgEIPQcnauBQ6Pv2tEGWW83lPTan6+boDTTtzASKn9oO0P+dqIH6iw",
1994
+ "ARGw/beScRk3xYpnhUsuMb/RDU5IhQYksD/95Ep9Kx3bDMFjFw7ShE0teHq/GAbymUj5vJQfEKZl",
1995
+ "9G+UByYkvoSoFFjQKK+T2JUVpmernGqVkDZ35oRSktgz0xesZkiKkc0iczAmgBY2w95bxrK4rfA5",
1996
+ "S6PFTRF06pZG55r+bcQAhZXEMzbchHh7WaxqEev97s7JlqyLl3VoIC7UBJcCasJLNeGE551r0R0/",
1997
+ "noRTsMSbQ3Eex5Kt",
1998
+ " </ds:X509Certificate>",
1999
+ " </ds:X509Data>",
2000
+ " </ds:KeyInfo>",
2001
+ " </KeyDescriptor>",
2002
+ " <KeyDescriptor use=\"encryption\">",
2003
+ " <ds:KeyInfo>",
2004
+ " <ds:X509Data>",
2005
+ " <ds:X509Certificate>",
2006
+ "MIIDRzCCAi+gAwIBAgIEHYaG7jANBgkqhkiG9w0BAQsFADBUMQswCQYDVQQGEwJVSzEQMA4GA1UE",
2007
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMQ0wCwYDVQQD",
2008
+ "EwR0ZXN0MB4XDTIxMDMwNjAyMTgzNloXDTMxMDMwNDAyMTgzNlowVDELMAkGA1UEBhMCVUsxEDAO",
2009
+ "BgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZvcmdlUm9jazENMAsG",
2010
+ "A1UEAxMEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJXDj9VJdnw0X/g2NS8A",
2011
+ "4AEJp5OmaspGrrFkDyZll+niAPNHfE74v9UB1fvH5SJTRiq81HS3sVSwMjjThstkZ81AeMFQeGaB",
2012
+ "Y16Dilkvi2vhIqoxSTjTs11lo5hSfMPOSPmRbH3jJ3Ta1FyywLKWsfM8lmhw+H17/jrViZxghPVt",
2013
+ "KqIaTz+VainC45bgxnZZ/eJSfyPoYTHf+AQRMKEeAxolvOOhwk6xoo3eRMLPhJm1LnwsfYJxJTbE",
2014
+ "aPwlYHkzmG3VF/X3dCRuXvgjA+whD/e0qSfjrUe1r5X/x0NSygE716IKip3iBuNxZR4s8NrF+N6V",
2015
+ "H44aZEE6nxdqh5BOPU0CAwEAAaMhMB8wHQYDVR0OBBYEFPY8mXz+eNBNDNOfShi1X3RNHXqUMA0G",
2016
+ "CSqGSIb3DQEBCwUAA4IBAQBK9OIz9XW+PX8A29PKSUgRJbDPqIWyCilnKyV00Rpxe40KhQqUV8ur",
2017
+ "PioiVxz+YIgf+6VtNhF6ClUX4pDOT48QxnSqX5Qy3Xm/+Sfsm6Sa4EPkLaZYspqoySAHv9FcdLWJ",
2018
+ "u7VvWbDw9oDWG2fZCatNXFzhLWC2EI+vF5tmKDatJLbRHGqQ1jQQpVlYsHcCvaJUThO+jA8X8Yq6",
2019
+ "UqYxD2Z+RV/WboIBbx21sS1HQTeR3tUhz4y4+FYr2c4o2VPrrzQ2NmUN/I5iMxWIGOgHm5/2ZAhl",
2020
+ "J/Ap7YiDLr8eMtidvAdXmN9Sg7iTNVi6ylhqanZh56MKWXDKD2BxLXiQgJge",
2021
+ " </ds:X509Certificate>",
2022
+ " </ds:X509Data>",
2023
+ " </ds:KeyInfo>",
2024
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\">",
2025
+ " <ds:DigestMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#sha256\"/>",
2026
+ " </EncryptionMethod>",
2027
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\">",
2028
+ " <xenc:KeySize>128</xenc:KeySize>",
2029
+ " </EncryptionMethod>",
2030
+ " </KeyDescriptor>",
2031
+ " <ArtifactResolutionService index=\"0\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/ArtifactResolver/metaAlias/alpha/IDPFedlet\"/>",
2032
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPFedlet\" ResponseLocation=\"https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPFedlet\"/>",
2033
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPFedlet\" ResponseLocation=\"https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPFedlet\"/>",
2034
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/IDPSloSoap/metaAlias/alpha/IDPFedlet\"/>",
2035
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPFedlet\" ResponseLocation=\"https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPFedlet\"/>",
2036
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPFedlet\" ResponseLocation=\"https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPFedlet\"/>",
2037
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/IDPMniSoap/metaAlias/alpha/IDPFedlet\"/>",
2038
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>",
2039
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>",
2040
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>",
2041
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>",
2042
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName</NameIDFormat>",
2043
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos</NameIDFormat>",
2044
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName</NameIDFormat>",
2045
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/SSORedirect/metaAlias/alpha/IDPFedlet\"/>",
2046
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/SSOPOST/metaAlias/alpha/IDPFedlet\"/>",
2047
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/SSOSoap/metaAlias/alpha/IDPFedlet\"/>",
2048
+ " <NameIDMappingService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/NIMSoap/metaAlias/alpha/IDPFedlet\"/>",
2049
+ " <AssertionIDRequestService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/AIDReqSoap/IDPRole/metaAlias/alpha/IDPFedlet\"/>",
2050
+ " <AssertionIDRequestService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:URI\" Location=\"https://idc.scheuber.io/am/AIDReqUri/IDPRole/metaAlias/alpha/IDPFedlet\"/>",
2051
+ " </IDPSSODescriptor>",
2052
+ "</EntityDescriptor>",
2053
+ "",
2054
+ ""
2055
+ ],
2056
+ "dm9sa2VyRGV2U1A": [
2057
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
2058
+ "<EntityDescriptor entityID=\"volkerDevSP\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
2059
+ " <SPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
2060
+ " <KeyDescriptor use=\"signing\">",
2061
+ " <ds:KeyInfo>",
2062
+ " <ds:X509Data>",
2063
+ " <ds:X509Certificate>",
2064
+ "MIIDXzCCAkegAwIBAgIEXw0sqjANBgkqhkiG9w0BAQsFADBgMQswCQYDVQQGEwJVSzEQMA4GA1UE",
2065
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMRkwFwYDVQQD",
2066
+ "ExByc2Fqd3RzaWduaW5na2V5MB4XDTIxMDMwNjAyMTgzNVoXDTMxMDMwNDAyMTgzNVowYDELMAkG",
2067
+ "A1UEBhMCVUsxEDAOBgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZv",
2068
+ "cmdlUm9jazEZMBcGA1UEAxMQcnNhand0c2lnbmluZ2tleTCCASIwDQYJKoZIhvcNAQEBBQADggEP",
2069
+ "ADCCAQoCggEBAI7DfQgOfXacEXp9EUBbH4PosMK36VIeZDO/gllKmJYnOsa+7FPHMJi7OETsF7sF",
2070
+ "FkiL63+3KiqBIk1b9cIp6SWnp7Z2Hvz+WwgF6o0ZhRWbpF1FyLHZWKB2H30BdY6I3keE2xnvOsmq",
2071
+ "X9pyTdap52WatS06GMAzpisMEZsremV49vc5zuVS//QWSmv6r0S9UNfgW1iICKfqxeYibAND2kgc",
2072
+ "2+0I9QTabH59601aGm2bgTr+EOVtbQUEvblz7/l6b4Q4y8o+BmwXk+olPKgBruPa0XOXBpCa7b/d",
2073
+ "SfLI7z2XHyMzqNG9IGg0LWMtlj7WC0V2gJIrvoxBkSApDUWxyOkCAwEAAaMhMB8wHQYDVR0OBBYE",
2074
+ "FMfL4Owt4dhAwUApAiUclxOHGeUcMA0GCSqGSIb3DQEBCwUAA4IBAQA3xUrvKeQcTMaywcrv8KPP",
2075
+ "WWz5ybb5TxW/5T/W7BtOwFqgEIPQcnauBQ6Pv2tEGWW83lPTan6+boDTTtzASKn9oO0P+dqIH6iw",
2076
+ "ARGw/beScRk3xYpnhUsuMb/RDU5IhQYksD/95Ep9Kx3bDMFjFw7ShE0teHq/GAbymUj5vJQfEKZl",
2077
+ "9G+UByYkvoSoFFjQKK+T2JUVpmernGqVkDZ35oRSktgz0xesZkiKkc0iczAmgBY2w95bxrK4rfA5",
2078
+ "S6PFTRF06pZG55r+bcQAhZXEMzbchHh7WaxqEev97s7JlqyLl3VoIC7UBJcCasJLNeGE551r0R0/",
2079
+ "noRTsMSbQ3Eex5Kt",
2080
+ " </ds:X509Certificate>",
2081
+ " </ds:X509Data>",
2082
+ " </ds:KeyInfo>",
2083
+ " </KeyDescriptor>",
2084
+ " <KeyDescriptor use=\"encryption\">",
2085
+ " <ds:KeyInfo>",
2086
+ " <ds:X509Data>",
2087
+ " <ds:X509Certificate>",
2088
+ "MIIDRzCCAi+gAwIBAgIEHYaG7jANBgkqhkiG9w0BAQsFADBUMQswCQYDVQQGEwJVSzEQMA4GA1UE",
2089
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMQ0wCwYDVQQD",
2090
+ "EwR0ZXN0MB4XDTIxMDMwNjAyMTgzNloXDTMxMDMwNDAyMTgzNlowVDELMAkGA1UEBhMCVUsxEDAO",
2091
+ "BgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZvcmdlUm9jazENMAsG",
2092
+ "A1UEAxMEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJXDj9VJdnw0X/g2NS8A",
2093
+ "4AEJp5OmaspGrrFkDyZll+niAPNHfE74v9UB1fvH5SJTRiq81HS3sVSwMjjThstkZ81AeMFQeGaB",
2094
+ "Y16Dilkvi2vhIqoxSTjTs11lo5hSfMPOSPmRbH3jJ3Ta1FyywLKWsfM8lmhw+H17/jrViZxghPVt",
2095
+ "KqIaTz+VainC45bgxnZZ/eJSfyPoYTHf+AQRMKEeAxolvOOhwk6xoo3eRMLPhJm1LnwsfYJxJTbE",
2096
+ "aPwlYHkzmG3VF/X3dCRuXvgjA+whD/e0qSfjrUe1r5X/x0NSygE716IKip3iBuNxZR4s8NrF+N6V",
2097
+ "H44aZEE6nxdqh5BOPU0CAwEAAaMhMB8wHQYDVR0OBBYEFPY8mXz+eNBNDNOfShi1X3RNHXqUMA0G",
2098
+ "CSqGSIb3DQEBCwUAA4IBAQBK9OIz9XW+PX8A29PKSUgRJbDPqIWyCilnKyV00Rpxe40KhQqUV8ur",
2099
+ "PioiVxz+YIgf+6VtNhF6ClUX4pDOT48QxnSqX5Qy3Xm/+Sfsm6Sa4EPkLaZYspqoySAHv9FcdLWJ",
2100
+ "u7VvWbDw9oDWG2fZCatNXFzhLWC2EI+vF5tmKDatJLbRHGqQ1jQQpVlYsHcCvaJUThO+jA8X8Yq6",
2101
+ "UqYxD2Z+RV/WboIBbx21sS1HQTeR3tUhz4y4+FYr2c4o2VPrrzQ2NmUN/I5iMxWIGOgHm5/2ZAhl",
2102
+ "J/Ap7YiDLr8eMtidvAdXmN9Sg7iTNVi6ylhqanZh56MKWXDKD2BxLXiQgJge",
2103
+ " </ds:X509Certificate>",
2104
+ " </ds:X509Data>",
2105
+ " </ds:KeyInfo>",
2106
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\">",
2107
+ " <ds:DigestMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#sha256\"/>",
2108
+ " </EncryptionMethod>",
2109
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\">",
2110
+ " <xenc:KeySize>128</xenc:KeySize>",
2111
+ " </EncryptionMethod>",
2112
+ " </KeyDescriptor>",
2113
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://openam-volker-dev.forgeblocks.com/am/SPSloRedirect/metaAlias/alpha/volkerDevSP\" ResponseLocation=\"https://openam-volker-dev.forgeblocks.com/am/SPSloRedirect/metaAlias/alpha/volkerDevSP\"/>",
2114
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://openam-volker-dev.forgeblocks.com/am/SPSloPOST/metaAlias/alpha/volkerDevSP\" ResponseLocation=\"https://openam-volker-dev.forgeblocks.com/am/SPSloPOST/metaAlias/alpha/volkerDevSP\"/>",
2115
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://openam-volker-dev.forgeblocks.com/am/SPSloSoap/metaAlias/alpha/volkerDevSP\"/>",
2116
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://openam-volker-dev.forgeblocks.com/am/SPMniPOST/metaAlias/alpha/volkerDevSP\" ResponseLocation=\"https://openam-volker-dev.forgeblocks.com/am/SPMniPOST/metaAlias/alpha/volkerDevSP\"/>",
2117
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://openam-volker-dev.forgeblocks.com/am/SPMniRedirect/metaAlias/alpha/volkerDevSP\" ResponseLocation=\"https://openam-volker-dev.forgeblocks.com/am/SPMniRedirect/metaAlias/alpha/volkerDevSP\"/>",
2118
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://openam-volker-dev.forgeblocks.com/am/SPMniSoap/metaAlias/alpha/volkerDevSP\" ResponseLocation=\"https://openam-volker-dev.forgeblocks.com/am/SPMniSoap/metaAlias/alpha/volkerDevSP\"/>",
2119
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>",
2120
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>",
2121
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>",
2122
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>",
2123
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName</NameIDFormat>",
2124
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos</NameIDFormat>",
2125
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName</NameIDFormat>",
2126
+ " <AssertionConsumerService index=\"1\" isDefault=\"true\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://openam-volker-dev.forgeblocks.com/am/Consumer/metaAlias/alpha/volkerDevSP\"/>",
2127
+ " </SPSSODescriptor>",
2128
+ "</EntityDescriptor>",
2129
+ "",
2130
+ ""
2131
+ ],
2132
+ "aVNQQXp1cmU": [
2133
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
2134
+ "<EntityDescriptor entityID=\"iSPAzure\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
2135
+ " <SPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
2136
+ " <KeyDescriptor use=\"signing\">",
2137
+ " <ds:KeyInfo>",
2138
+ " <ds:X509Data>",
2139
+ " <ds:X509Certificate>",
2140
+ "MIIDXzCCAkegAwIBAgIEXw0sqjANBgkqhkiG9w0BAQsFADBgMQswCQYDVQQGEwJVSzEQMA4GA1UE",
2141
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMRkwFwYDVQQD",
2142
+ "ExByc2Fqd3RzaWduaW5na2V5MB4XDTIxMDMwNjAyMTgzNVoXDTMxMDMwNDAyMTgzNVowYDELMAkG",
2143
+ "A1UEBhMCVUsxEDAOBgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZv",
2144
+ "cmdlUm9jazEZMBcGA1UEAxMQcnNhand0c2lnbmluZ2tleTCCASIwDQYJKoZIhvcNAQEBBQADggEP",
2145
+ "ADCCAQoCggEBAI7DfQgOfXacEXp9EUBbH4PosMK36VIeZDO/gllKmJYnOsa+7FPHMJi7OETsF7sF",
2146
+ "FkiL63+3KiqBIk1b9cIp6SWnp7Z2Hvz+WwgF6o0ZhRWbpF1FyLHZWKB2H30BdY6I3keE2xnvOsmq",
2147
+ "X9pyTdap52WatS06GMAzpisMEZsremV49vc5zuVS//QWSmv6r0S9UNfgW1iICKfqxeYibAND2kgc",
2148
+ "2+0I9QTabH59601aGm2bgTr+EOVtbQUEvblz7/l6b4Q4y8o+BmwXk+olPKgBruPa0XOXBpCa7b/d",
2149
+ "SfLI7z2XHyMzqNG9IGg0LWMtlj7WC0V2gJIrvoxBkSApDUWxyOkCAwEAAaMhMB8wHQYDVR0OBBYE",
2150
+ "FMfL4Owt4dhAwUApAiUclxOHGeUcMA0GCSqGSIb3DQEBCwUAA4IBAQA3xUrvKeQcTMaywcrv8KPP",
2151
+ "WWz5ybb5TxW/5T/W7BtOwFqgEIPQcnauBQ6Pv2tEGWW83lPTan6+boDTTtzASKn9oO0P+dqIH6iw",
2152
+ "ARGw/beScRk3xYpnhUsuMb/RDU5IhQYksD/95Ep9Kx3bDMFjFw7ShE0teHq/GAbymUj5vJQfEKZl",
2153
+ "9G+UByYkvoSoFFjQKK+T2JUVpmernGqVkDZ35oRSktgz0xesZkiKkc0iczAmgBY2w95bxrK4rfA5",
2154
+ "S6PFTRF06pZG55r+bcQAhZXEMzbchHh7WaxqEev97s7JlqyLl3VoIC7UBJcCasJLNeGE551r0R0/",
2155
+ "noRTsMSbQ3Eex5Kt",
2156
+ " </ds:X509Certificate>",
2157
+ " </ds:X509Data>",
2158
+ " </ds:KeyInfo>",
2159
+ " </KeyDescriptor>",
2160
+ " <KeyDescriptor use=\"encryption\">",
2161
+ " <ds:KeyInfo>",
2162
+ " <ds:X509Data>",
2163
+ " <ds:X509Certificate>",
2164
+ "MIIDRzCCAi+gAwIBAgIEHYaG7jANBgkqhkiG9w0BAQsFADBUMQswCQYDVQQGEwJVSzEQMA4GA1UE",
2165
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMQ0wCwYDVQQD",
2166
+ "EwR0ZXN0MB4XDTIxMDMwNjAyMTgzNloXDTMxMDMwNDAyMTgzNlowVDELMAkGA1UEBhMCVUsxEDAO",
2167
+ "BgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZvcmdlUm9jazENMAsG",
2168
+ "A1UEAxMEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJXDj9VJdnw0X/g2NS8A",
2169
+ "4AEJp5OmaspGrrFkDyZll+niAPNHfE74v9UB1fvH5SJTRiq81HS3sVSwMjjThstkZ81AeMFQeGaB",
2170
+ "Y16Dilkvi2vhIqoxSTjTs11lo5hSfMPOSPmRbH3jJ3Ta1FyywLKWsfM8lmhw+H17/jrViZxghPVt",
2171
+ "KqIaTz+VainC45bgxnZZ/eJSfyPoYTHf+AQRMKEeAxolvOOhwk6xoo3eRMLPhJm1LnwsfYJxJTbE",
2172
+ "aPwlYHkzmG3VF/X3dCRuXvgjA+whD/e0qSfjrUe1r5X/x0NSygE716IKip3iBuNxZR4s8NrF+N6V",
2173
+ "H44aZEE6nxdqh5BOPU0CAwEAAaMhMB8wHQYDVR0OBBYEFPY8mXz+eNBNDNOfShi1X3RNHXqUMA0G",
2174
+ "CSqGSIb3DQEBCwUAA4IBAQBK9OIz9XW+PX8A29PKSUgRJbDPqIWyCilnKyV00Rpxe40KhQqUV8ur",
2175
+ "PioiVxz+YIgf+6VtNhF6ClUX4pDOT48QxnSqX5Qy3Xm/+Sfsm6Sa4EPkLaZYspqoySAHv9FcdLWJ",
2176
+ "u7VvWbDw9oDWG2fZCatNXFzhLWC2EI+vF5tmKDatJLbRHGqQ1jQQpVlYsHcCvaJUThO+jA8X8Yq6",
2177
+ "UqYxD2Z+RV/WboIBbx21sS1HQTeR3tUhz4y4+FYr2c4o2VPrrzQ2NmUN/I5iMxWIGOgHm5/2ZAhl",
2178
+ "J/Ap7YiDLr8eMtidvAdXmN9Sg7iTNVi6ylhqanZh56MKWXDKD2BxLXiQgJge",
2179
+ " </ds:X509Certificate>",
2180
+ " </ds:X509Data>",
2181
+ " </ds:KeyInfo>",
2182
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\">",
2183
+ " <ds:DigestMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#sha256\"/>",
2184
+ " </EncryptionMethod>",
2185
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\">",
2186
+ " <xenc:KeySize>128</xenc:KeySize>",
2187
+ " </EncryptionMethod>",
2188
+ " </KeyDescriptor>",
2189
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/SPSloRedirect/metaAlias/alpha/iSPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/SPSloRedirect/metaAlias/alpha/iSPAzure\"/>",
2190
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/SPSloPOST/metaAlias/alpha/iSPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/SPSloPOST/metaAlias/alpha/iSPAzure\"/>",
2191
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/SPSloSoap/metaAlias/alpha/iSPAzure\"/>",
2192
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/SPMniRedirect/metaAlias/alpha/iSPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/SPMniRedirect/metaAlias/alpha/iSPAzure\"/>",
2193
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/SPMniPOST/metaAlias/alpha/iSPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/SPMniPOST/metaAlias/alpha/iSPAzure\"/>",
2194
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/SPMniSoap/metaAlias/alpha/iSPAzure\" ResponseLocation=\"https://idc.scheuber.io/am/SPMniSoap/metaAlias/alpha/iSPAzure\"/>",
2195
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>",
2196
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>",
2197
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>",
2198
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>",
2199
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName</NameIDFormat>",
2200
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos</NameIDFormat>",
2201
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName</NameIDFormat>",
2202
+ " <AssertionConsumerService index=\"0\" isDefault=\"true\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact\" Location=\"https://idc.scheuber.io/am/AuthConsumer/metaAlias/alpha/iSPAzure\"/>",
2203
+ " <AssertionConsumerService index=\"1\" isDefault=\"false\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/AuthConsumer/metaAlias/alpha/iSPAzure\"/>",
2204
+ " <AssertionConsumerService index=\"2\" isDefault=\"false\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:PAOS\" Location=\"https://idc.scheuber.io/am/Consumer/ECP/metaAlias/alpha/iSPAzure\"/>",
2205
+ " </SPSSODescriptor>",
2206
+ "</EntityDescriptor>",
2207
+ "",
2208
+ ""
2209
+ ],
2210
+ "aHR0cHM6Ly9pZGMuc2NoZXViZXIuaW8vYW0vc2FtbDIvSURQQnJvYWRjb20": [
2211
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
2212
+ "<EntityDescriptor entityID=\"https://idc.scheuber.io/am/saml2/IDPBroadcom\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
2213
+ " <IDPSSODescriptor protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
2214
+ " <KeyDescriptor use=\"signing\">",
2215
+ " <ds:KeyInfo>",
2216
+ " <ds:X509Data>",
2217
+ " <ds:X509Certificate>",
2218
+ "MIIDXzCCAkegAwIBAgIEXw0sqjANBgkqhkiG9w0BAQsFADBgMQswCQYDVQQGEwJVSzEQMA4GA1UE",
2219
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMRkwFwYDVQQD",
2220
+ "ExByc2Fqd3RzaWduaW5na2V5MB4XDTIxMDMwNjAyMTgzNVoXDTMxMDMwNDAyMTgzNVowYDELMAkG",
2221
+ "A1UEBhMCVUsxEDAOBgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZv",
2222
+ "cmdlUm9jazEZMBcGA1UEAxMQcnNhand0c2lnbmluZ2tleTCCASIwDQYJKoZIhvcNAQEBBQADggEP",
2223
+ "ADCCAQoCggEBAI7DfQgOfXacEXp9EUBbH4PosMK36VIeZDO/gllKmJYnOsa+7FPHMJi7OETsF7sF",
2224
+ "FkiL63+3KiqBIk1b9cIp6SWnp7Z2Hvz+WwgF6o0ZhRWbpF1FyLHZWKB2H30BdY6I3keE2xnvOsmq",
2225
+ "X9pyTdap52WatS06GMAzpisMEZsremV49vc5zuVS//QWSmv6r0S9UNfgW1iICKfqxeYibAND2kgc",
2226
+ "2+0I9QTabH59601aGm2bgTr+EOVtbQUEvblz7/l6b4Q4y8o+BmwXk+olPKgBruPa0XOXBpCa7b/d",
2227
+ "SfLI7z2XHyMzqNG9IGg0LWMtlj7WC0V2gJIrvoxBkSApDUWxyOkCAwEAAaMhMB8wHQYDVR0OBBYE",
2228
+ "FMfL4Owt4dhAwUApAiUclxOHGeUcMA0GCSqGSIb3DQEBCwUAA4IBAQA3xUrvKeQcTMaywcrv8KPP",
2229
+ "WWz5ybb5TxW/5T/W7BtOwFqgEIPQcnauBQ6Pv2tEGWW83lPTan6+boDTTtzASKn9oO0P+dqIH6iw",
2230
+ "ARGw/beScRk3xYpnhUsuMb/RDU5IhQYksD/95Ep9Kx3bDMFjFw7ShE0teHq/GAbymUj5vJQfEKZl",
2231
+ "9G+UByYkvoSoFFjQKK+T2JUVpmernGqVkDZ35oRSktgz0xesZkiKkc0iczAmgBY2w95bxrK4rfA5",
2232
+ "S6PFTRF06pZG55r+bcQAhZXEMzbchHh7WaxqEev97s7JlqyLl3VoIC7UBJcCasJLNeGE551r0R0/",
2233
+ "noRTsMSbQ3Eex5Kt",
2234
+ " </ds:X509Certificate>",
2235
+ " </ds:X509Data>",
2236
+ " </ds:KeyInfo>",
2237
+ " </KeyDescriptor>",
2238
+ " <KeyDescriptor use=\"encryption\">",
2239
+ " <ds:KeyInfo>",
2240
+ " <ds:X509Data>",
2241
+ " <ds:X509Certificate>",
2242
+ "MIIDRzCCAi+gAwIBAgIEHYaG7jANBgkqhkiG9w0BAQsFADBUMQswCQYDVQQGEwJVSzEQMA4GA1UE",
2243
+ "CBMHQnJpc3RvbDEQMA4GA1UEBxMHQnJpc3RvbDESMBAGA1UEChMJRm9yZ2VSb2NrMQ0wCwYDVQQD",
2244
+ "EwR0ZXN0MB4XDTIxMDMwNjAyMTgzNloXDTMxMDMwNDAyMTgzNlowVDELMAkGA1UEBhMCVUsxEDAO",
2245
+ "BgNVBAgTB0JyaXN0b2wxEDAOBgNVBAcTB0JyaXN0b2wxEjAQBgNVBAoTCUZvcmdlUm9jazENMAsG",
2246
+ "A1UEAxMEdGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJXDj9VJdnw0X/g2NS8A",
2247
+ "4AEJp5OmaspGrrFkDyZll+niAPNHfE74v9UB1fvH5SJTRiq81HS3sVSwMjjThstkZ81AeMFQeGaB",
2248
+ "Y16Dilkvi2vhIqoxSTjTs11lo5hSfMPOSPmRbH3jJ3Ta1FyywLKWsfM8lmhw+H17/jrViZxghPVt",
2249
+ "KqIaTz+VainC45bgxnZZ/eJSfyPoYTHf+AQRMKEeAxolvOOhwk6xoo3eRMLPhJm1LnwsfYJxJTbE",
2250
+ "aPwlYHkzmG3VF/X3dCRuXvgjA+whD/e0qSfjrUe1r5X/x0NSygE716IKip3iBuNxZR4s8NrF+N6V",
2251
+ "H44aZEE6nxdqh5BOPU0CAwEAAaMhMB8wHQYDVR0OBBYEFPY8mXz+eNBNDNOfShi1X3RNHXqUMA0G",
2252
+ "CSqGSIb3DQEBCwUAA4IBAQBK9OIz9XW+PX8A29PKSUgRJbDPqIWyCilnKyV00Rpxe40KhQqUV8ur",
2253
+ "PioiVxz+YIgf+6VtNhF6ClUX4pDOT48QxnSqX5Qy3Xm/+Sfsm6Sa4EPkLaZYspqoySAHv9FcdLWJ",
2254
+ "u7VvWbDw9oDWG2fZCatNXFzhLWC2EI+vF5tmKDatJLbRHGqQ1jQQpVlYsHcCvaJUThO+jA8X8Yq6",
2255
+ "UqYxD2Z+RV/WboIBbx21sS1HQTeR3tUhz4y4+FYr2c4o2VPrrzQ2NmUN/I5iMxWIGOgHm5/2ZAhl",
2256
+ "J/Ap7YiDLr8eMtidvAdXmN9Sg7iTNVi6ylhqanZh56MKWXDKD2BxLXiQgJge",
2257
+ " </ds:X509Certificate>",
2258
+ " </ds:X509Data>",
2259
+ " </ds:KeyInfo>",
2260
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p\">",
2261
+ " <ds:DigestMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#sha256\"/>",
2262
+ " </EncryptionMethod>",
2263
+ " <EncryptionMethod Algorithm=\"http://www.w3.org/2001/04/xmlenc#aes128-cbc\">",
2264
+ " <xenc:KeySize>128</xenc:KeySize>",
2265
+ " </EncryptionMethod>",
2266
+ " </KeyDescriptor>",
2267
+ " <ArtifactResolutionService index=\"0\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/ArtifactResolver/metaAlias/alpha/IDPBroadcom\"/>",
2268
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPBroadcom\" ResponseLocation=\"https://idc.scheuber.io/am/IDPSloRedirect/metaAlias/alpha/IDPBroadcom\"/>",
2269
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPBroadcom\" ResponseLocation=\"https://idc.scheuber.io/am/IDPSloPOST/metaAlias/alpha/IDPBroadcom\"/>",
2270
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/IDPSloSoap/metaAlias/alpha/IDPBroadcom\"/>",
2271
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPBroadcom\" ResponseLocation=\"https://idc.scheuber.io/am/IDPMniRedirect/metaAlias/alpha/IDPBroadcom\"/>",
2272
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPBroadcom\" ResponseLocation=\"https://idc.scheuber.io/am/IDPMniPOST/metaAlias/alpha/IDPBroadcom\"/>",
2273
+ " <ManageNameIDService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/IDPMniSoap/metaAlias/alpha/IDPBroadcom\"/>",
2274
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>",
2275
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>",
2276
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>",
2277
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>",
2278
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName</NameIDFormat>",
2279
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos</NameIDFormat>",
2280
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName</NameIDFormat>",
2281
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://idc.scheuber.io/am/SSORedirect/metaAlias/alpha/IDPBroadcom\"/>",
2282
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://idc.scheuber.io/am/SSOPOST/metaAlias/alpha/IDPBroadcom\"/>",
2283
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/SSOSoap/metaAlias/alpha/IDPBroadcom\"/>",
2284
+ " <NameIDMappingService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/NIMSoap/metaAlias/alpha/IDPBroadcom\"/>",
2285
+ " <AssertionIDRequestService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://idc.scheuber.io/am/AIDReqSoap/IDPRole/metaAlias/alpha/IDPBroadcom\"/>",
2286
+ " <AssertionIDRequestService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:URI\" Location=\"https://idc.scheuber.io/am/AIDReqUri/IDPRole/metaAlias/alpha/IDPBroadcom\"/>",
2287
+ " </IDPSSODescriptor>",
2288
+ "</EntityDescriptor>",
2289
+ "",
2290
+ ""
2291
+ ],
2292
+ "dXJuOmZlZGVyYXRpb246TWljcm9zb2Z0T25saW5l": [
2293
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
2294
+ "<EntityDescriptor entityID=\"urn:federation:MicrosoftOnline\" ID=\"_e46a1193-e8a7-48ed-804f-1516729ecb5f\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
2295
+ " <Extensions>",
2296
+ " <alg:DigestMethod Algorithm=\"http://www.w3.org/2000/09/xmldsig#sha1\"/>",
2297
+ " <alg:SigningMethod Algorithm=\"http://www.w3.org/2000/09/xmldsig#rsa-sha1\"/>",
2298
+ " </Extensions>",
2299
+ " <SPSSODescriptor WantAssertionsSigned=\"true\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
2300
+ " <KeyDescriptor use=\"signing\">",
2301
+ " <ds:KeyInfo>",
2302
+ " ",
2303
+ " ",
2304
+ " ",
2305
+ " ",
2306
+ " ",
2307
+ " <ds:X509Data>",
2308
+ " <ds:X509Certificate>",
2309
+ "MIIC/TCCAeWgAwIBAgIQbgDHfi3t1JNGVqwD5/7lmjANBgkqhkiG9w0BAQsFADApMScwJQYDVQQD",
2310
+ "Ex5MaXZlIElEIFNUUyBTaWduaW5nIFB1YmxpYyBLZXkwHhcNMjAxMjIxMDAwMDAwWhcNMjUxMjIx",
2311
+ "MDAwMDAwWjApMScwJQYDVQQDEx5MaXZlIElEIFNUUyBTaWduaW5nIFB1YmxpYyBLZXkwggEiMA0G",
2312
+ "CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDFT0/0/2qQurnYa0LbJHF9YYozhEH6r9mCxVDBYbew",
2313
+ "SG4tGgrWpsewQ/96pcczGMQctMvU+h2eX38Hx/f9JAIDbuRQzQlsPhQS7DDZ6WlTXU+t8d/g2C7f",
2314
+ "pSoLs4KVdJih4xyjLUWj+BK/ijsRjBt4Riw9VbJH/DdWKyoSMbECEiE+s1RtLP/eYoMmNfxyQGqW",
2315
+ "irCNqVNBTlqzYQp4dgF0foYy4ktoxwmQOVoTcIMFYp1I4pFPI7CxuMLkfK0X7aTbM7YGphvMfJxJ",
2316
+ "kjrQdyI7G5d1t4DNi3zkEbBT7FGAr6qPt3Kn9ralpqJKHdpEBA9N0vNwQo5XTYIhUbPQ16IRAgMB",
2317
+ "AAGjITAfMB0GA1UdDgQWBBRs7tPmfkksSr67KtElHjYZbeaCTjANBgkqhkiG9w0BAQsFAAOCAQEA",
2318
+ "JqwMZSjQJ36x+1sty6EeLKQLQewQwPaEC47Zut+8bXed6Q8jMZ0bfa/MM7XquEcabaMZLQuKLft4",
2319
+ "4YXwXXQOfQrI2qjQr3eToJFlDT9hR0rfp9wQqttDxd6Aa6RWwDTgo5oKUQCTKLHhEy8uWzScK0eG",
2320
+ "t2d7TWTaDXjRSwNq6tM7fRhZs07tKBV3xfi9EQy/mlavAMFRBVm86NSo7AsOG1IOMq03U3ooCWAX",
2321
+ "h9PdvvHNfHhH19futAnC/HeOjwRF1Qc527aBMphYFQLdiThfmfmiE/AhQqCwZ2oE7uCJhBtR+Kb1",
2322
+ "ZGhjI35pHfsSqGiFa7Kr+5ave822PDcke89Mvg==",
2323
+ " </ds:X509Certificate>",
2324
+ " </ds:X509Data>",
2325
+ " </ds:KeyInfo>",
2326
+ " </KeyDescriptor>",
2327
+ " <KeyDescriptor use=\"signing\">",
2328
+ " <ds:KeyInfo>",
2329
+ " ",
2330
+ " ",
2331
+ " ",
2332
+ " ",
2333
+ " ",
2334
+ " <ds:X509Data>",
2335
+ " <ds:X509Certificate>",
2336
+ "MIIC/TCCAeWgAwIBAgIQN/GPegnT8blP2EcSdMMbBzANBgkqhkiG9w0BAQsFADApMScwJQYDVQQD",
2337
+ "Ex5MaXZlIElEIFNUUyBTaWduaW5nIFB1YmxpYyBLZXkwHhcNMjEwMjE4MDAwMDAwWhcNMjYwMjE4",
2338
+ "MDAwMDAwWjApMScwJQYDVQQDEx5MaXZlIElEIFNUUyBTaWduaW5nIFB1YmxpYyBLZXkwggEiMA0G",
2339
+ "CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDXdLGU2Ll5RPdDUnKQ+f/HS5qiTay2cCh9U2AS6oDM",
2340
+ "6SOxVhYGtoeJ1VPebcLnpgLfhPxzrwWoVzXSEF+VRQbnYID2Jb4khjgyEeoThk3VqrThwhahpSbB",
2341
+ "g2vo06vIOp1TS2R1BiwHKTLoB1i1IJnaIFSC3BN6pY4flXWyLQt/5ABXElv2XZLqXM9Eefj6Ji40",
2342
+ "nLIsiW4dWw3BDa/ywWW0MsiW5ojGq4vovcAgENe/4NUbju70gHP/WS5D9bW5p+OIQi7/unrlWe/h",
2343
+ "3A6jtBbbRlXYXlN+Z22uTTyyCD/W8zeXaACLvHagwEMrQePDXBZqc/iX2kI+ooZr1sC/H39RAgMB",
2344
+ "AAGjITAfMB0GA1UdDgQWBBSrX2dm3LwT9jb/p+bAAdYQpE+/NjANBgkqhkiG9w0BAQsFAAOCAQEA",
2345
+ "eqJfYHnsA9qhGttXFfFpPW4DQLh5w6JCce7vGvWINr5fr1DnQdcOr+wwjQ/tqbckAL2v6z1AqjhS",
2346
+ "78kbfegnAQDwioJZ1olYYvLOxKoa6HF+b1/p0Mlub8Zukk2n1b2lKPBBOibOasSY7gQDwlIZi7tl",
2347
+ "9nMTxUfdYK+E5Axv7DVnmUCwcnnpV5/1SFdNyW2kWO4C68rrjMOvECfwrKkbfVJM8f9krEUBuoBF",
2348
+ "8dTDv7D2ZM4Q2buC70NbfaNWUX0yFvKI0IuTqk8RBfGTRQ4fZAbhMPaykEpBu6dNjTi5YOa0lNqF",
2349
+ "GS7Ax7leCh5x9lV8elcLkXs8ySo8AOQJk0hgIw==",
2350
+ " </ds:X509Certificate>",
2351
+ " </ds:X509Data>",
2352
+ " </ds:KeyInfo>",
2353
+ " </KeyDescriptor>",
2354
+ " <KeyDescriptor use=\"signing\">",
2355
+ " <ds:KeyInfo>",
2356
+ " ",
2357
+ " ",
2358
+ " ",
2359
+ " ",
2360
+ " ",
2361
+ " <ds:X509Data>",
2362
+ " <ds:X509Certificate>",
2363
+ "MIIC/TCCAeWgAwIBAgIQN/GPegnT8blP2EcSdMMbBzANBgkqhkiG9w0BAQsFADApMScwJQYDVQQD",
2364
+ "Ex5MaXZlIElEIFNUUyBTaWduaW5nIFB1YmxpYyBLZXkwHhcNMjEwMjE4MDAwMDAwWhcNMjYwMjE4",
2365
+ "MDAwMDAwWjApMScwJQYDVQQDEx5MaXZlIElEIFNUUyBTaWduaW5nIFB1YmxpYyBLZXkwggEiMA0G",
2366
+ "CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDXdLGU2Ll5RPdDUnKQ+f/HS5qiTay2cCh9U2AS6oDM",
2367
+ "6SOxVhYGtoeJ1VPebcLnpgLfhPxzrwWoVzXSEF+VRQbnYID2Jb4khjgyEeoThk3VqrThwhahpSbB",
2368
+ "g2vo06vIOp1TS2R1BiwHKTLoB1i1IJnaIFSC3BN6pY4flXWyLQt/5ABXElv2XZLqXM9Eefj6Ji40",
2369
+ "nLIsiW4dWw3BDa/ywWW0MsiW5ojGq4vovcAgENe/4NUbju70gHP/WS5D9bW5p+OIQi7/unrlWe/h",
2370
+ "3A6jtBbbRlXYXlN+Z22uTTyyCD/W8zeXaACLvHagwEMrQePDXBZqc/iX2kI+ooZr1sC/H39RAgMB",
2371
+ "AAGjITAfMB0GA1UdDgQWBBSrX2dm3LwT9jb/p+bAAdYQpE+/NjANBgkqhkiG9w0BAQsFAAOCAQEA",
2372
+ "eqJfYHnsA9qhGttXFfFpPW4DQLh5w6JCce7vGvWINr5fr1DnQdcOr+wwjQ/tqbckAL2v6z1AqjhS",
2373
+ "78kbfegnAQDwioJZ1olYYvLOxKoa6HF+b1/p0Mlub8Zukk2n1b2lKPBBOibOasSY7gQDwlIZi7tl",
2374
+ "9nMTxUfdYK+E5Axv7DVnmUCwcnnpV5/1SFdNyW2kWO4C68rrjMOvECfwrKkbfVJM8f9krEUBuoBF",
2375
+ "8dTDv7D2ZM4Q2buC70NbfaNWUX0yFvKI0IuTqk8RBfGTRQ4fZAbhMPaykEpBu6dNjTi5YOa0lNqF",
2376
+ "GS7Ax7leCh5x9lV8elcLkXs8ySo8AOQJk0hgIw==",
2377
+ " </ds:X509Certificate>",
2378
+ " </ds:X509Data>",
2379
+ " </ds:KeyInfo>",
2380
+ " </KeyDescriptor>",
2381
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://login.microsoftonline.com/login.srf\"/>",
2382
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>",
2383
+ " <NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</NameIDFormat>",
2384
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>",
2385
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>",
2386
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>",
2387
+ " <AssertionConsumerService index=\"0\" isDefault=\"true\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://login.microsoftonline.com/login.srf\"/>",
2388
+ " <AssertionConsumerService index=\"1\" isDefault=\"false\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign\" Location=\"https://login.microsoftonline.com/login.srf\"/>",
2389
+ " <AssertionConsumerService index=\"2\" isDefault=\"false\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:PAOS\" Location=\"https://login.microsoftonline.com/login.srf\"/>",
2390
+ " </SPSSODescriptor>",
2391
+ "</EntityDescriptor>",
2392
+ "",
2393
+ ""
2394
+ ],
2395
+ "aHR0cHM6Ly9zYW1sLm15dGVzdHJ1bi5jb20vc3A": [
2396
+ "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?>",
2397
+ "<EntityDescriptor entityID=\"https://saml.mytestrun.com/sp\" xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\" xmlns:query=\"urn:oasis:names:tc:SAML:metadata:ext:query\" xmlns:mdattr=\"urn:oasis:names:tc:SAML:metadata:attribute\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:xenc=\"http://www.w3.org/2001/04/xmlenc#\" xmlns:xenc11=\"http://www.w3.org/2009/xmlenc11#\" xmlns:alg=\"urn:oasis:names:tc:SAML:metadata:algsupport\" xmlns:x509qry=\"urn:oasis:names:tc:SAML:metadata:X509:query\" xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\">",
2398
+ " <SPSSODescriptor AuthnRequestsSigned=\"false\" WantAssertionsSigned=\"false\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">",
2399
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://saml.mytestrun.com:443/sp/fedletSloRedirect\" ResponseLocation=\"https://saml.mytestrun.com:443/sp/fedletSloRedirect\"/>",
2400
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://saml.mytestrun.com:443/sp/fedletSloPOST\" ResponseLocation=\"https://saml.mytestrun.com:443/sp/fedletSloPOST\"/>",
2401
+ " <SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:SOAP\" Location=\"https://saml.mytestrun.com:443/sp/fedletSloSoap\"/>",
2402
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>",
2403
+ " <AssertionConsumerService index=\"0\" isDefault=\"true\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://saml.mytestrun.com:443/sp/fedletapplication\"/>",
2404
+ " <AssertionConsumerService index=\"1\" isDefault=\"false\" Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact\" Location=\"https://saml.mytestrun.com:443/sp/fedletapplication\"/>",
2405
+ " </SPSSODescriptor>",
2406
+ " <RoleDescriptor xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"query:AttributeQueryDescriptorType\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\"/>",
2407
+ " <XACMLAuthzDecisionQueryDescriptor WantAssertionsSigned=\"false\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\"/>",
2408
+ "</EntityDescriptor>",
2409
+ "",
2410
+ ""
2411
+ ]
2412
+ }
2413
+ }
2414
+ }